Author:
Papachristoudis Dimitris G.,Halkidis Spyros T.,Stephanides George
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Mathematics
Reference23 articles.
1. Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average-case equivalence. In: Proceedings of the 29th symposium on the theory of computing (STOC), pp. 284–293, ACM Press (1997)
2. Backes, W., Wetzel, S.: An efficient LLL Gram using buffered transformations. In: Proceedings of computer algebra in scientific computing, LNCS vol. 4770, pp 31–44 (2007)
3. Backes, W., Wetzel, S.: Heuristics on lattice basis in practice. J. Exp. Algorithmics 7, 1–21 (2002)
4. Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer Verlag, Berlin-Heidelberg (2009)
5. Bremner, M.R.: Lattice Basis Reduction, An Introduction to the LLL Algorithm and its Applications. CRC Press, Boca Raton (2012)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献