Author:
Bernstein Daniel J.,Chou Tung
Publisher
Springer Nature Switzerland
Reference139 articles.
1. Report of the workshop on estimation of significant advances in computer technology, 1976. URL: https://nvlpubs.nist.gov/nistpubs/Legacy/IR/nbsir76-1189.pdf.
2. Sunny Cove: Intel’s lost generation, 2022. URL: https://chipsandcheese.com/2022/06/07/sunny-cove-intels-lost-generation/.
3. Scott Aaronson. Why isn’t it more mysterious?, 2015. URL: https://web.archive.org/web/20150423085814/http://ideas.aeon.co/viewpoints/1829.
4. Carlisle M. Adams and Henk Meijer. Security-related comments regarding McEliece’s public-key cryptosystem. In Carl Pomerance, editor, Advances in Cryptology – CRYPTO’87, volume 293 of Lecture Notes in Computer Science, pages 224–228, Santa Barbara, CA, USA, August 16–20, 1988. Springer, Heidelberg, Germany. https://doi.org/10.1007/3-540-48184-2_20.
5. Divesh Aggarwal, Daniel Dadush, Oded Regev, and Noah Stephens-Davidowitz. Solving the shortest vector problem in $$2^n$$ time using discrete Gaussian sampling: Extended abstract. In Rocco A. Servedio and Ronitt Rubinfeld, editors, 47th Annual ACM Symposium on Theory of Computing, pages 733–742, Portland, OR, USA, June 14–17, 2015. ACM Press. https://doi.org/10.1145/2746539.2746606.