Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem
暂无分享,去创建一个
Xiaoyun Wang | Chengliang Tian | Jingguo Bi | Mingjie Liu | Xiaoyun Wang | Jingguo Bi | Chengliang Tian | M. Liu
[1] Phong Q. Nguyen. The Two Faces of Lattices in Cryptology , 2001, Selected Areas in Cryptography.
[2] Nicolas Gama,et al. Finding short lattice vectors within mordell's inequality , 2008, STOC.
[3] U. Fincke,et al. Improved methods for calculating vectors of short length in a lattice , 1985 .
[4] Alexander Vardy,et al. Closest point search in lattices , 2002, IEEE Trans. Inf. Theory.
[5] Philip N. Klein,et al. Finding the closest lattice vector when it's unusually close , 2000, SODA '00.
[6] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[7] Leonard M. Adleman,et al. On breaking generalized knapsack public key cryptosystems , 1983, STOC.
[8] K. Böröczky,et al. Covering the Sphere by Equal Spherical Balls , 2003 .
[9] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[10] Phong Q. Nguyen. Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 , 1999, CRYPTO.
[11] Cynthia Dwork,et al. A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.
[12] Miklós Ajtai,et al. The shortest vector problem in L2 is NP-hard for randomized reductions (extended abstract) , 1998, STOC '98.
[13] Damien Stehlé,et al. Solving the Shortest Lattice Vector Problem in Time 22.465n , 2009, IACR Cryptol. ePrint Arch..
[14] Ravi Kumar,et al. A sieve algorithm for the shortest lattice vector problem , 2001, STOC '01.
[15] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[16] B. Aronov,et al. Discrete and computational geometry : the Goodman-Pollack Festschrift , 2003 .
[17] Damien Stehlé,et al. Closest Vectors, Successive Minima, and Dual HKZ-Bases of Lattices , 2000, ICALP.
[18] Phong Q. Nguyen,et al. Sieve algorithms for the shortest vector problem are practical , 2008, J. Math. Cryptol..
[19] Don Coppersmith,et al. Finding a Small Root of a Univariate Modular Equation , 1996, EUROCRYPT.
[20] Ravi Kannan,et al. Improved algorithms for integer programming and related lattice problems , 1983, STOC.
[21] Miklós Ajtai,et al. Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..
[22] Dan Boneh,et al. Cryptanalysis of RSA with private key d less than N0.292 , 1999, IEEE Trans. Inf. Theory.
[23] Meir Feder,et al. Finding the Closest Lattice Point by Iterative Slicing , 2007, ISIT.
[24] Jeffrey C. Lagarias,et al. Solving low density subset sum problems , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[25] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, FOCS 1982.
[26] C. P. Schnorr,et al. A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms , 1987, Theor. Comput. Sci..
[27] Michael E. Pohst,et al. On the computation of lattice vectors of minimal length, successive minima and reduced bases with applications , 1981, SIGS.
[28] Craig Gentry,et al. Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..
[29] Daniele Micciancio,et al. Faster exponential time algorithms for the shortest vector problem , 2010, SODA '10.
[30] Daniele Micciancio,et al. A Deterministic Single Exponential Time Algorithm for Most Lattice Problems based on Voronoi Cell Computations ( Extended Abstract ) , 2009 .
[31] Claus-Peter Schnorr,et al. Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems , 1991, FCT.
[32] D. Boneh. Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .
[33] H. Minkowski,et al. Geometrie der Zahlen , 1896 .
[34] Nicolas Gama,et al. Lattice Enumeration Using Extreme Pruning , 2010, EUROCRYPT.