A hierarchy of polynomial time lattice basis reduction algorithms

From MaRDI portal
Revision as of 01:33, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1101500

DOI10.1016/0304-3975(87)90064-8zbMath0642.10030DBLPjournals/tcs/Schnorr87OpenAlexW1989510734WikidataQ57567987 ScholiaQ57567987MaRDI QIDQ1101500

Claus Peter Schnorr

Publication date: 1987

Published in: Theoretical Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0304-3975(87)90064-8




Related Items (only showing first 100 items - show all)

Meta-heuristic approaches to solve shortest lattice vector problemSieve, Enumerate, Slice, and Lift:A Tale of Three Signatures: Practical Attack of ECDSA with wNAFHardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related SchemesAttacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationPartially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmHidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiationSieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive HashingTargeted Homomorphic Attribute-Based EncryptionOn the Security of OSIDHCloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector ProblemNTRU Fatigue: How Stretched is Overstretched?Finding many collisions via reusable quantum walks. Application to lattice sievingFiat-Shamir signatures based on module-NTRUHomomorphic encryption: a mathematical surveySubfield attacks on HSVP in ideal latticesLog-\(\mathcal{S}\)-unit lattices using explicit Stickelberger generators to solve approx ideal-SVPOn module unique-SVP and NTRUBlock Reduced Lattice Bases and Successive MinimaOn the hardness of the NTRU problemA sharper lower bound on Rankin's constantAlgebraic Cryptanalysis of CTRU CryptosystemThe curious case of the half-half Bitcoin ECDSA noncesMathematics of computation through the lens of linear equations and latticesJust Take the Average! An Embarrassingly Simple $2^n$-Time Algorithm for SVP (and CVP)Explicit Hard Instances of the Shortest Vector ProblemDeterministic compression with uncertain priorsSieve algorithms for the shortest vector problem are practicalThrackles: An Improved Upper BoundTesters and their applicationsOn the automorphism groups of strongly regular graphs IFaster private release of marginals on small databasesMechanism design in large gamesRedrawing the boundaries on purchasing data from privacy-sensitive individualsApproximation schemes via Sherali-Adams hierarchy for dense constraint satisfaction problems and assignment problemsComplexity of approximating CSP with balance / hard constraintsInteger feasibility of random polytopesMultireference alignment using semidefinite programmingPartial tests, universal tests and decomposabilityHigh dimensional expanders and property testingParameterized testabilityDirect sum fails for zero error average communicationRational argumentsLattice-Based Fault Attacks Against ECMQVOn a Waring’s problem for integral quadratic and Hermitian formsOn a quadratic Waring's problem with congruence conditionsApproximate CVP_p in Time 2^{0.802 n}Algorithms for the Shortest and Closest Lattice Vector ProblemsLattice Reformulation CutsOn the Bit Security of Elliptic Curve Diffie–HellmanRevisiting Lattice Attacks on Overstretched NTRU ParametersShort Stickelberger Class Relations and Application to Ideal-SVPLa réduction des réseaux. Autour de l'algorithme de Lenstra, Lenstra, LovászBounding the sum of square roots via lattice reductionImproved Rounding for Spline Coefficients and KnotsSymplectic Lattice Reduction and NTRUHermite’s Constant and Lattice AlgorithmsLLL: A Tool for Effective Diophantine ApproximationThe Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise AppearanceCryptographic Functions from Worst-Case Complexity AssumptionsThe truth behind the myth of the folk theoremRigorous and Efficient Short Lattice Vectors EnumerationExpanders with respect to Hadamard spaces and random graphsProvable lattice reduction of $$\mathbb {Z}^n$$ with blocksize n/2Limits of local algorithms over sparse random graphsA Digital Signature Scheme Based on CVP  ∞Improvements in the analysis of Kannan's CVP algorithmPredicting Lattice ReductionQuantum algorithms for algebraic problemsAnalysis of Gauss-Sieve for Solving the Shortest Vector Problem in LatticesA Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP ChallengeApproximating the Closest Vector Problem Using an Approximate Shortest Vector OracleA time-distance trade-off for GDD with preprocessing: instantiating the DLW heuristicHermite reduction and a Waring’s problem for integral quadratic forms over number fieldsPseudorandom Functions: Three Decades LaterOn Lovász' lattice reduction and the nearest lattice point problemDual lattice attacks for closest vector problems (with preprocessing)Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceTowards faster polynomial-time lattice reductionColumn basis reduction and decomposable knapsack problemsLattice basis reduction: Improved practical algorithms and solving subset sum problemsLattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSAFiat-Shamir and correlation intractability from strong KDM-secure encryptionApproximate CVP in time \(2^{0.802 n}\) -- now in any norm!Segment LLL reduction of lattice bases using modular arithmeticOn the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptographySimultaneously good bases of a lattice and its reciprocal latticeA Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$-Sparse Representations of Short Lattice VectorsLattice-based algorithms for number partitioning in the hard phaseFaster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive HashingSharper bounds on four lattice constantsLattice Point Enumeration on Block Reduced BasesFinding shortest lattice vectors faster using quantum searchSolving low-density multiple subset sum problems with SVP oracleCorrecting noisy exponentiation black-boxes modulo a primeSelf-dual DeepBKZ for finding short lattice vectorsCharacterizing overstretched NTRU attacksA polynomial algorithm for minimizing discrete convic functions in fixed dimensionSparse recovery with integrality constraintsOn the modular inversion hidden number problem




Cites Work




This page was built for publication: A hierarchy of polynomial time lattice basis reduction algorithms