Noisy Chinese remaindering in the Lee norm
暂无分享,去创建一个
[1] Igor E. Shparlinski,et al. The Insecurity of the Digital Signature Algorithm with Partially Known Nonces , 2002, Journal of Cryptology.
[2] Shojiro Sakata. On Fast Interpolation Method for Guruswami-Sudan List Decoding of One-Point Algebraic-Geometry Codes , 2001, AAECC.
[3] Madhu Sudan,et al. Ideal Error-Correcting Codes: Unifying Algebraic and Number-Theoretic Algorithms , 2001, AAECC.
[4] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[5] Phong Q. Nguyen. The Two Faces of Lattices in Cryptology , 2001, Selected Areas in Cryptography.
[6] Aggelos Kiayias,et al. Secure Games with Polynomial Expressions , 2001, ICALP.
[7] Ravi Kumar,et al. A sieve algorithm for the shortest lattice vector problem , 2001, STOC '01.
[8] Igor E. Shparlinski,et al. Sparse polynomial approximation in finite fields , 2001, STOC '01.
[9] T. Scharping. Hide-and-seek: China's elusive population data , 2001 .
[10] Venkatesan Guruswami,et al. "Soft-decision" decoding of Chinese remainder codes , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[11] Jacques Stern,et al. Lattice Reduction in Cryptology: An Update , 2000, ANTS.
[12] R. R. Nielsen. A class of Sudan-decodable codes , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[13] Frédéric Magniez,et al. Exact and Approximate Testing/Correcting of Algebraic Functions: A Survey , 2000, Theoretical Aspects of Computer Science.
[14] Dan Boneh,et al. Finding smooth integers in short intervals using CRT decoding , 2000, STOC '00.
[15] Tom Høholdt,et al. Decoding Hermitian Codes with Sudan's Algorithm , 1999, AAECC.
[16] Dana Ron,et al. Chinese remaindering with errors , 1999, STOC '99.
[17] H. Wasserman,et al. List Decoding of Algebraic-Geometric Codes , 1999, IEEE Trans. Inf. Theory.
[18] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[19] Antoine Joux,et al. Lattice Reduction: A Toolbox for the Cryptanalyst , 1998, Journal of Cryptology.
[20] Madhu Sudan,et al. Decoding of Reed Solomon Codes beyond the Error-Correction Bound , 1997, J. Complex..
[21] Dan Boneh,et al. Rounding in lattices and its cryptographic applications , 1997, SODA '97.
[22] A. Salomaa,et al. Chinese remainder theorem: applications in computing, coding, cryptography , 1996 .
[23] Dan Boneh,et al. Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes , 1996, CRYPTO.
[24] C. Ding. Chinese remainder theorem , 1996 .
[25] Ronitt Rubinfeld,et al. Learning polynomials with queries: The highly noisy case , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[26] Ronitt Rubinfeld,et al. Reconstructing algebraic functions from mixed data , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[27] J. G. Pierce,et al. Geometric Algorithms and Combinatorial Optimization , 2016 .
[28] C. P. Schnorr,et al. A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms , 1987, Theor. Comput. Sci..
[29] R. Kannan. ALGORITHMIC GEOMETRY OF NUMBERS , 1987 .
[30] P. Erdös,et al. Products of integers in short intervals , 1984 .
[31] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[32] T. N. Shorey,et al. On Grimm's problem relating to factorisation of a block of consecutive integers. II. , 1976 .
[33] On Grimm's problem relating to factorisation of a block of consecutive integers. , 1975 .
[34] J. Rosser,et al. Approximate formulas for some functions of prime numbers , 1962 .