Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Worst-case complexity bounds for algorithms in the theory of integral quadratic forms - MaRDI portal

Worst-case complexity bounds for algorithms in the theory of integral quadratic forms

From MaRDI portal
Publication:3928238

DOI10.1016/0196-6774(80)90021-8zbMath0473.68030OpenAlexW2025525128MaRDI QIDQ3928238

Jeffrey C. Lagarias

Publication date: 1980

Published in: Journal of Algorithms (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0196-6774(80)90021-8




Related Items

A tighter proof for CCA secure inner product functional encryption: genericity meets efficiencyAlgorithms to construct Minkowski reduced and Hermite reduced lattice basesA hierarchy of polynomial time lattice basis reduction algorithmsInfoMod: a visual and computational approach to Gauss' binary quadratic formsDirichlet’s proof of the three-square theorem: An algorithmic perspectiveA key-exchange system based on imaginary quadratic fieldsIterated ring class fields and the icosahedronI want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groupsThe optimal LLL algorithm is still polynomial in fixed dimension.Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)On the parametrization of solutions of quadratic equationsDensity computations for real quadratic unitsOn the computation of quadratic 2-class groupsSmallest Reduction Matrix of Binary Quadratic FormsA linear algorithm for integer programming in the planeSelected Applications of LLL in Number TheoryA Rigorous Time Bound for Factoring IntegersHow to pick a random integer matrix? (and other questions)Identification and signatures based on NP-hard problems of indefinite quadratic formsОб использовании групп классов идеалов квадратичных полей для построения криптографических систем с открытым ключомBandwidth-efficient threshold EC-DSABandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive securityShort vectors of planar lattices via continued fractionsAn algorithm for finding a shortest vector in a two-dimensional modular lattice