Author:
Hoffstein Jeffrey,Howgrave-Graham Nick,Pipher Jill,Silverman Joseph H.,Whyte William
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. M. Ajtai, C. Dwork, A public-key cryptosystem with worst case/average case equivalence. In Proc. 29th ACM Symposium on Theory of Computing, 1997, 284–293. 122
2. L. Babai On Lovász lattice reduction and the nearest lattice point problem, Combinatorica, vol. 6, 1986, 1–13. 127
3. H. Cohen, A course in computational algebraic number theory, GTM 138, Springer-Verlag, 1993. 126
4. Wei Dai, Crypto++ 4.0 Benchmarks,
http://www.eskimo.com/∼weidai/benchmarks.html
139
5. Consortium for Efficient Embedded Security, Efficient Embedded Security Standard #1, available from
http://www.ceesstandards.org
139
Cited by
123 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献