Lenstra–Lenstra–Lovász lattice basis reduction algorithm

Results: 35



#Item
11On Quantum Sieve Approaches to the Lattice Shortest Vector Problem Daniel Epelbaum December[removed]

On Quantum Sieve Approaches to the Lattice Shortest Vector Problem Daniel Epelbaum December[removed]

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2014-12-25 20:29:11
12The Insecurity of Esign in Practical Implementations Pierre-Alain Fouque1 , Nick Howgrave-Graham2 , Gwena¨elle Martinet3 , and Guillaume Poupard3 ´ Ecole

The Insecurity of Esign in Practical Implementations Pierre-Alain Fouque1 , Nick Howgrave-Graham2 , Gwena¨elle Martinet3 , and Guillaume Poupard3 ´ Ecole

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
13Lattice-based Cryptography Oded Regev? Tel Aviv University, Israel Abstract. We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with

Lattice-based Cryptography Oded Regev? Tel Aviv University, Israel Abstract. We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
14On the concrete hardness of Learning with Errors Martin R. Albrecht1 , Rachel Player1 , and Sam Scott1 Information Security Group, Royal Holloway, University of London Abstract. The Learning with Errors (LWE) problem has

On the concrete hardness of Learning with Errors Martin R. Albrecht1 , Rachel Player1 , and Sam Scott1 Information Security Group, Royal Holloway, University of London Abstract. The Learning with Errors (LWE) problem has

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-19 12:06:15
15Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2  1

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 03:49:32
16Non-Abelian Analogs of Lattice Rounding Evgeni Begelfor Department of Computer Science The Hebrew University of Jerusalem [removed] Stephen D. Miller∗

Non-Abelian Analogs of Lattice Rounding Evgeni Begelfor Department of Computer Science The Hebrew University of Jerusalem [removed] Stephen D. Miller∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 23:40:13
17BKZ 2.0: Better Lattice Security Estimates Yuanmi Chen and Phong Q. Nguyen 1 2

BKZ 2.0: Better Lattice Security Estimates Yuanmi Chen and Phong Q. Nguyen 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-01-05 23:20:01
18Lattice Enumeration using Extreme Pruning Nicolas Gama1 , Phong Q. Nguyen2 , and Oded Regev3 1 GREYC and ENSICAEN, France. INRIA and ENS, France. http://www.di.ens.fr/~pnguyen/.

Lattice Enumeration using Extreme Pruning Nicolas Gama1 , Phong Q. Nguyen2 , and Oded Regev3 1 GREYC and ENSICAEN, France. INRIA and ENS, France. http://www.di.ens.fr/~pnguyen/.

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-07-19 15:34:39
19	  
     !

     ! "

Add to Reading List

Source URL: www.ctc.gov.kw

Language: English - Date: 2014-07-17 03:44:40
20Partial LLL Reduction Xiaohu Xie Xiao-Wen Chang  Mazen Al Borno

Partial LLL Reduction Xiaohu Xie Xiao-Wen Chang Mazen Al Borno

Add to Reading List

Source URL: www.cs.mcgill.ca

Language: English - Date: 2011-08-29 23:51:55