scientific article; zbMATH DE number 1852140
From MaRDI portal
Publication:4787203
zbMath1006.11033MaRDI QIDQ4787203
Alexander May, Joseph H. Silverman
Publication date: 9 January 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2146/21460110
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60) Quadratic forms (reduction theory, extreme forms, etc.) (11H55)
Related Items (11)
How to meet ternary LWE keys ⋮ A non-commutative cryptosystem based on quaternion algebras ⋮ PASS-encrypt: a public key cryptosystem based on partial evaluation of polynomials ⋮ NTRU Fatigue: How Stretched is Overstretched? ⋮ Characterizing overstretched NTRU attacks ⋮ Revisiting lower dimension lattice attacks on NTRU ⋮ Cryptanalysis of the GGH cryptosystem ⋮ Algebraic Cryptanalysis of CTRU Cryptosystem ⋮ Revisiting Lattice Attacks on Overstretched NTRU Parameters ⋮ Symplectic Lattice Reduction and NTRU ⋮ Predicting Lattice Reduction
Uses Software
This page was built for publication: