Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Hermite’s Constant and Lattice Algorithms - MaRDI portal

Hermite’s Constant and Lattice Algorithms

From MaRDI portal
Publication:5188538

DOI10.1007/978-3-642-02295-1_2zbMath1230.11155OpenAlexW196044395MaRDI QIDQ5188538

Phong Q. Nguyen

Publication date: 5 March 2010

Published in: The LLL Algorithm (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-02295-1_2




Related Items (24)

Multivariate Encryption Schemes Based on Polynomial Equations over Real NumbersA trace map attack against special ring-LWE samplesSolving the search-LWE problem over projected latticesAn extension of Kannan's embedding for solving ring-based LWE problemsLattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSADense packings from algebraic number fields and codesWell-rounded twists of ideal lattices from imaginary quadratic fieldsSelf-dual DeepBKZ for finding short lattice vectorsThe hidden number problem with small unknown multipliers: cryptanalyzing MEGA in six queries and other applicationsDevelopment and analysis of massive parallelization of a lattice basis reduction algorithmFast practical lattice reduction through iterated compressionA sharper lower bound on Rankin's constantRecovering a sum of two squares decompositionAn improved method for predicting truncated multiple recursive generators with unknown parametersLimits of a conjecture on a leakage-resilient cryptosystemETRU: NTRU over the Eisenstein integersDynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementationAlgorithms for the Shortest and Closest Lattice Vector ProblemsAnalysis of DeepBKZ reduction for finding short lattice vectorsA Numerical Transcendental Method in Algebraic Geometry: Computation of Picard Groups and Related InvariantsLattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasuresA Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP ChallengeWorst case short lattice vector enumeration on block reduced bases of arbitrary blocksizesA new parallel lattice reduction algorithm for BKZ reduced bases



Cites Work


This page was built for publication: Hermite’s Constant and Lattice Algorithms