Algorithmic Number Theory

From MaRDI portal
Publication:5899254

DOI10.1007/11792086zbMath1143.11357OpenAlexW2977481208WikidataQ29400612 ScholiaQ29400612MaRDI QIDQ5899254

Phong Q. Nguyen, Damien Stehlé

Publication date: 2 May 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11792086




Related Items

Cryptanalysis of NTRU where the private polynomial has one or more consecutive zero coefficientsBounding basis reduction propertiesTowards faster polynomial-time lattice reductionA Tale of Three Signatures: Practical Attack of ECDSA with wNAFAttacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationFiat-Shamir and correlation intractability from strong KDM-secure encryptionPredicting truncated multiple recursive generators with unknown parametersCloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector ProblemPotLLL: a polynomial time version of LLL with deep insertionsPractical attacks on small private exponent RSA: new records and new insightsThe hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applicationsFast practical lattice reduction through iterated compressionLattice enumeration for tower NFS: a 521-bit discrete logarithm computationLattice enumeration and automorphisms for tower NFS: a 521-bit discrete logarithm computationTwisted-PHS: using the product formula to solve approx-SVP in ideal latticesAn improved method for predicting truncated multiple recursive generators with unknown parametersExplicit Hard Instances of the Shortest Vector ProblemThrackles: An Improved Upper BoundStorage efficient algorithm for Hermite normal form using LLLAlgorithms for the Shortest and Closest Lattice Vector ProblemsLLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE schemeSecond order statistical behavior of LLL and BKZThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionRandom Sampling Revisited: Lattice Enumeration with Discrete PruningHermite’s Constant and Lattice AlgorithmsLLL: A Tool for Effective Diophantine ApproximationCryptographic Functions from Worst-Case Complexity AssumptionsCryptanalysis of General Lu-Lee Type SystemsA Digital Signature Scheme Based on CVP  ∞Predicting Lattice ReductionAnalysis of Gauss-Sieve for Solving the Shortest Vector Problem in LatticesA stochastic variant of the abelian sandpile modelA new parallel lattice reduction algorithm for BKZ reduced basesA physical study of the LLL algorithm




This page was built for publication: Algorithmic Number Theory