scientific article; zbMATH DE number 1852142

From MaRDI portal
Publication:4787205

zbMath1006.94531MaRDI QIDQ4787205

Jacques Stern, Phong Q. Nguyen

Publication date: 9 January 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2146/21460146

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (42)

Meta-heuristic approaches to solve shortest lattice vector problemPerturbation Analysis of the QR factor R in the context of LLL lattice basis reductionFully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problemHidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiationProbability method for cryptanalysis of general multivariate modular linear equationRecovering zeros of polynomials modulo a primeBalanced Integer Solutions of Linear EquationsA note on the concrete hardness of the shortest independent vector in latticesRevisiting approximate polynomial common divisor problem and noisy multipolynomial reconstructionCorrecting noisy exponentiation black-boxes modulo a primeLattice polly cracker cryptosystemsExtended partial key exposure attacks on RSA: improvement up to full size decryption exponentsA Tool Kit for Partial Key Exposure Attacks on RSAPartial key exposure attacks on RSA: achieving the Boneh-Durfee boundThe projection games conjecture and the hardness of approximation of Super-SAT and related problemsA semidefinite programming method for integer convex quadratic minimizationSparse non-negative stencils for anisotropic diffusionFHE over the Integers: Decomposed and Batched in the Post-Quantum RegimeSmall CRT-Exponent RSA RevisitedSmall CRT-exponent RSA revisitedPredicting nonlinear pseudorandom number generatorsSymplectic Lattice Reduction and NTRULearning a Parallelepiped: Cryptanalysis of GGH and NTRU SignaturesCryptographic Functions from Worst-Case Complexity AssumptionsCryptanalysis of General Lu-Lee Type SystemsSolving Linear Equations Modulo Divisors: On Factoring Given Any BitsUnnamed ItemA Digital Signature Scheme Based on CVP  ∞Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption ExponentsNoisy polynomial interpolation modulo prime powersImprovements in the analysis of Kannan's CVP algorithmSpeeding-Up Lattice Reduction with Random Projections (Extended Abstract)Predicting Lattice ReductionLearning a parallelepiped: Cryptanalysis of GGH and NTRU signaturesPartial Key Exposure Attacks on RSA with Multiple Exponent PairsWorst case short lattice vector enumeration on block reduced bases of arbitrary blocksizesOn the reduction of a random basisDeterministic Construction of an Approximate M-Ellipsoid and its Application to Derandomizing Lattice AlgorithmsNoisy Chinese remaindering in the Lee normUnnamed ItemGeneralized cryptanalysis of small CRT-exponent RSASlide reduction, revisited -- filling the gaps in SVP approximation




This page was built for publication: