Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Floating-Point LLL Revisited - MaRDI portal

Floating-Point LLL Revisited

From MaRDI portal
Publication:5385731

DOI10.1007/11426639_13zbMath1137.94353OpenAlexW1532770887MaRDI QIDQ5385731

Phong Q. Nguyen, Damien Stehlé

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_13




Related Items (44)

Lattice reduction with approximate enumeration oracles. Practical algorithms and concrete performancePerturbation Analysis of the QR factor R in the context of LLL lattice basis reductionAttacking RSA with a Composed Decryption Exponent Using Unravelled LinearizationAttacking (EC)DSA Given Only an Implicit HintLattice Reduction for Modular KnapsackAn efficient lattice reduction using reuse technique blockwisely on NTRUProbability method for cryptanalysis of general multivariate modular linear equationWorst Cases for the Exponential Function in the IEEE 754r decimal64 FormatLattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSASegment LLL reduction of lattice bases using modular arithmeticModular Las Vegas algorithms for polynomial absolute factorizationCloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector ProblemA New Partial Key Exposure Attack on Multi-power RSAEstimation of the hardness of the learning with errors problem with a restricted number of samplesPotLLL: a polynomial time version of LLL with deep insertionsFlat Tori with Large Laplacian Eigenvalues in Dimensions up to EightPractical attacks on small private exponent RSA: new records and new insightsComputational Number Theory, Past, Present, and FutureA public key cryptosystem based on three new provable problemsGradual sub-lattice reduction and a new complexity for factoring polynomialsExplicit Hard Instances of the Shortest Vector ProblemThrackles: An Improved Upper BoundPrivately outsourcing exponentiation to a single server: cryptanalysis and optimal constructionsLLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE schemeHigher-dimensional 3-adic CM constructionList decoding of number field codesFast LLL-type lattice reductionCryptanalysis of RSA for a special case with \(d > e\)Symplectic Lattice Reduction and NTRULLL: A Tool for Effective Diophantine ApproximationUsing LLL-Reduction for Solving RSA and Factorization ProblemsCryptographic Functions from Worst-Case Complexity AssumptionsCryptanalysis of General Lu-Lee Type SystemsRigorous and Efficient Short Lattice Vectors EnumerationSolving Linear Equations Modulo Divisors: On Factoring Given Any BitsAn experimental comparison of some LLL-type lattice basis reduction algorithmsSolving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?A Digital Signature Scheme Based on CVP  ∞Identification and signatures based on NP-hard problems of indefinite quadratic formsSpeeding-Up Lattice Reduction with Random Projections (Extended Abstract)Predicting Lattice ReductionFactoring polynomials over global fieldsFast reduction of algebraic lattices over cyclotomic fieldsA Vectorized, Cache Efficient LLL Implementation




This page was built for publication: Floating-Point LLL Revisited