Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3549702

zbMath1230.11153MaRDI QIDQ3549702

Phong Q. Nguyen, Nicolas Gama

Publication date: 5 January 2009


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (38)

Dual lattice attacks for closest vector problems (with preprocessing)Bounding basis reduction propertiesLattice reduction with approximate enumeration oracles. Practical algorithms and concrete performanceTowards faster polynomial-time lattice reductionPartially Known Nonces and Fault Injection Attacks on SM2 Signature AlgorithmSharper bounds on four lattice constantsLattice Point Enumeration on Block Reduced BasesSelf-dual DeepBKZ for finding short lattice vectorsEHNP strikes back: analyzing SM2 implementationsOn the modular inversion hidden number problemSubfield attacks on HSVP in ideal latticesOn module unique-SVP and NTRUA sharper lower bound on Rankin's constantImproving convergence and practicality of slide-type reductionsA lattice reduction algorithm based on sublattice BKZJust Take the Average! An Embarrassingly Simple $2^n$-Time Algorithm for SVP (and CVP)Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementationExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationAlgorithms for the Shortest and Closest Lattice Vector ProblemsSecond order statistical behavior of LLL and BKZShort Stickelberger Class Relations and Application to Ideal-SVPCryptographic Functions from Worst-Case Complexity AssumptionsRigorous and Efficient Short Lattice Vectors EnumerationPredicting Lattice ReductionA Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP ChallengeA \(2^{n/2}\)-time algorithm for \(\sqrt{n} \)-SVP and \(\sqrt{n} \)-Hermite SVP, and an improved time-approximation tradeoff for (H)SVPOn bounded distance decoding with predicate: breaking the ``lattice barrier for the hidden number problemAdvanced lattice sieving on GPUs, with tensor coresWorst case short lattice vector enumeration on block reduced bases of arbitrary blocksizesThe convergence of slide-type reductionsOn the success probability of solving unique SVP via BKZA time-distance trade-off for GDD with preprocessing: instantiating the DLW heuristicA Subfield Lattice Attack on Overstretched NTRU AssumptionsFast reduction of algebraic lattices over cyclotomic fieldsFaster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\)Lattice reduction for modules, or how to reduce ModuleSVP to ModuleSVPSlide reduction, revisited -- filling the gaps in SVP approximationImproved lattice enumeration algorithms by primal and dual reordering methods




This page was built for publication: