<--- Back to Details
First PageDocument Content
Lattice / Matrix / Vector space / Projection / Determinant / Basis / Gram–Schmidt process / Hermite normal form / Ideal lattice cryptography / Algebra / Mathematics / Linear algebra
Date: 2010-01-12 16:25:05
Lattice
Matrix
Vector space
Projection
Determinant
Basis
Gram–Schmidt process
Hermite normal form
Ideal lattice cryptography
Algebra
Mathematics
Linear algebra

CSE 206A: Lattice Algorithms and Applications Winter: Basic Algorithms Instructor:

Add to Reading List

Source URL: cseweb.ucsd.edu

Download Document from Source Website

File Size: 165,77 KB

Share Document on Facebook

Similar Documents

Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

DocID: 1pJyl - View Document

Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ?  1

Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

DocID: 1pFRC - View Document

Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

DocID: 1kQdy - View Document

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1  University of Maryland

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

DocID: 1gx7z - View Document