## Found 89 Documents (Results 1–89)

100
MathJax

MSC:  94A60
Full Text:

### Ring theory. (English)Zbl 07533242

Goethals, Paul L. (ed.) et al., Mathematics in cyber research. Boca Raton, FL: CRC Press. 475-495 (2022).
Full Text:

### How to meet ternary LWE keys. (English)Zbl 1486.94131

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 701-731 (2021).
MSC:  94A60 81P94 81P68
Full Text:

### Fast NEON-based multiplication for lattice-based NIST post-quantum cryptography finalists. (English)Zbl 07495916

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 234-254 (2021).
MSC:  68P25 94A60 81P94
Full Text:

Full Text:

MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### Design of an alternative NTRU encryption with high secure and efficient. (English)Zbl 1472.94044

MSC:  94A60 68P25
Full Text:

### Achievable upper bound for the sup-norm of the product of elements of the ring of truncated polynomials and its application to the analysis of NTRU-like cryptosystems. (English. Russian original)Zbl 1469.94085

Cybern. Syst. Anal. 57, No. 2, 190-195 (2021); translation from Kibern. Sist. Anal. 57, No. 2, 23-29 (2021).
MSC:  94A60
Full Text:

### Fundamentals of cryptography. Introducing mathematical and algorithmic foundations. (English)Zbl 1467.94001

Undergraduate Topics in Computer Science. Cham: Springer (ISBN 978-3-030-73491-6/pbk; 978-3-030-73492-3/ebook). xv, 278 p. (2021).
MSC:  94-01 94A60 11G07
Full Text:

MSC:  94A60
Full Text:

### Cryptanalysis of NTRU where the private polynomial has one or more consecutive zero coefficients. (English)Zbl 1482.94040

MSC:  94A60 11T71 68P25
Full Text:

### Cloud-assisted asynchronous key transport with post-quantum security. (English)Zbl 1464.68039

Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 82-101 (2020).
MSC:  68M25 68P25 94A60
Full Text:

MSC:  68-XX
Full Text:

Full Text:

### Vulnerable public keys in NTRU cryptosystem. (English)Zbl 1459.94148

MSC:  94A60 11H06
Full Text:

### Exploring trade-offs in batch bounded distance decoding. (English)Zbl 1453.94057

Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 467-491 (2020).
MSC:  94A60
Full Text:

### Characterizing overstretched NTRU attacks. (English)Zbl 1448.94241

MSC:  94A62 11T71 94A60
Full Text:

### Flattening NTRU for evaluation key free homomorphic encryption. (English)Zbl 1448.94196

MSC:  94A60 81P94
Full Text:

### A signature scheme from the finite field isomorphism problem. (English)Zbl 1450.94051

MSC:  94A62 94A60
Full Text:

MSC:  94A62
Full Text:

MSC:  94A62
Full Text:

### Fast authentication from aggregate signatures with improved security. (English)Zbl 1460.94075

Goldberg, Ian (ed.) et al., Financial cryptography and data security. 23rd international conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11598, 686-705 (2019).
MSC:  94A62
Full Text:

### An innovative bicartesian algebra for designing of highly performed NTRU like cryptosystem. (An innovative bicartisian algebra for designing of highly performed NTRU like cryptosystem.) (English)Zbl 1458.94287

MSC:  94A60 81P94
Full Text:

### BI-NTRU encryption schemes: two new secure variants of NTRU. (English)Zbl 1457.94177

Gueye, Cheikh Thiecoumba (ed.) et al., Algebra, codes and cryptology. Proceedings of the first international conference, A2C 2019, in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019. Cham: Springer. Commun. Comput. Inf. Sci. 1133, 216-235 (2019).
MSC:  94A60
Full Text:

### Homomorphic encryption for finite automata. (English)Zbl 1455.94157

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11922, 473-502 (2019).
MSC:  94A60 68Q45
Full Text:

### Cryptanalysis of an NTRU-based proxy encryption scheme from ASIACCS’15. (English)Zbl 07173862

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 153-166 (2019).
MSC:  94A60 81P94
Full Text:

### Evaluating the potential for hardware acceleration of four NTRU-based key encapsulation mechanisms using software/hardware codesign. (English)Zbl 1455.94152

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 23-43 (2019).
MSC:  94A60 81P94
Full Text:

### Integer version of ring-LWE and its applications. (English)Zbl 1430.94072

Meng, Weizhi (ed.) et al., Security and privacy in social networks and big data. 5th international symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019. Revised selected papers. Singapore: Springer. Commun. Comput. Inf. Sci. 1095, 110-122 (2019).
MSC:  94A60
Full Text:

### Faster multiplication in $$\mathbb{Z}_{2^m}[x]$$ on Cortex-M4 to speed up NIST PQC candidates. (English)Zbl 1458.94246

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 281-301 (2019).
MSC:  94A60 68M07
Full Text:

### Decryption failure attacks on IND-CCA secure lattice-based schemes. (English)Zbl 07159418

Lin, Dongdai (ed.) et al., Public-key cryptography – PKC 2019. 22nd IACR international conference on practice and theory of public-key cryptography, Beijing, China, April 14–17, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11443, 565-598 (2019).
MSC:  94A60
Full Text:

### Cryptanalysis of NTRU cryptosystem. (Chinese. English summary)Zbl 1438.81012

MSC:  81P94 94A60
Full Text:

### A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack. (English)Zbl 1415.94466

MSC:  94A60 11T71
Full Text:

### Provably secure NTRUEncrypt over any cyclotomic field. (English)Zbl 1447.94056

Cid, Carlos (ed.) et al., Selected areas in cryptography – SAC 2018. 25th international conference, Calgary, AB, Canada, August 15–17, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11349, 391-417 (2019).
MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### A lattice attack on homomorphic NTRU with non-invertible public keys. (English)Zbl 1452.94059

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 248-254 (2018).
MSC:  94A60
Full Text:

### Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem. (English)Zbl 1457.94112

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10993, 184-210 (2018).
MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### Lattice Klepto – turning post-quantum crypto against itself. (English)Zbl 1384.94077

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 336-354 (2018).
MSC:  94A60 81P94
Full Text:

### NTRU prime: reducing attack surface at low cost. (English)Zbl 1384.94034

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 235-260 (2018).
MSC:  94A60 81P94
Full Text:

### High-speed key encapsulation from NTRU. (English)Zbl 1440.94058

Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 232-252 (2017).
MSC:  94A60
Full Text:

### A new alternative to NTRU cryptosystem based on highly dimensional algebra with dense lattice structure. (English)Zbl 07174175

MSC:  94-XX 81-XX
Full Text:

### Post quantum cryptography. (English)Zbl 07174174

MSC:  94-XX 68-XX
Full Text:

### Cold boot attacks on NTRU. (English)Zbl 1429.94064

Patra, Arpita (ed.) et al., Progress in cryptology – INDOCRYPT 2017. 18th international conference on cryptology in India, Chennai, India, December 10–13, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10698, 107-125 (2017).
MSC:  94A60
Full Text:

### A practical implementation of identity-based encryption over NTRU lattices. (English)Zbl 1397.94089

O’Neill, Máire (ed.), Cryptography and coding. 16th IMA international conference, IMACC 2017, Oxford, UK, December 12–14, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71044-0/pbk; 978-3-319-71045-7/ebook). Lecture Notes in Computer Science 10655, 227-246 (2017).
MSC:  94A60
Full Text:

### Multikey fully homomorphic encryption and applications. (English)Zbl 1382.68058

MSC:  68P25 94A60
Full Text:

### A variant of NTRU with split quaternions algebra. (English)Zbl 1375.94157

MSC:  94A60 17A35
Full Text:

### Provably secure NTRU instances over prime cyclotomic rings. (English)Zbl 1404.94122

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 409-434 (2017).
MSC:  94A60
Full Text:

### Cryptanalysis and improved construction of a group key agreement for secure group communication. (English)Zbl 1397.94109

Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 48-58 (2016).
MSC:  94A60
Full Text:

### A subfield lattice attack on overstretched NTRU assumptions. Cryptanalysis of some FHE and graded encoding schemes. (English)Zbl 1351.94019

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 153-178 (2016).
MSC:  94A60
Full Text:

### An efficient lattice reduction using reuse technique blockwisely on NTRU. (English)Zbl 1409.94938

MSC:  94B25 11T71 11Y16
Full Text:

MSC:  94A60
Full Text:

### On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack. (English)Zbl 1345.94045

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13–15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 24-43 (2016).
MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### Efficient identity-based encryption over NTRU lattices. (English)Zbl 1317.94103

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 22-41 (2014).
MSC:  94A60 94A62
Full Text:

### Lower bounds of shortest vector lengths in random NTRU lattices. (English)Zbl 1304.46004

MSC:  46A40 68Q17 68Q30
Full Text:

### On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. (English)Zbl 1286.68114

Karloff, Howard J. (ed.) et al., Proceedings of the 44th annual ACM symposium on theory of computing, STOC 2012. New York, NY, USA, May 19–22, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1245-5). 1219-1234 (2012).
MSC:  68P25 94A60
Full Text:

MSC:  94A60
Full Text:

### An algebraic broadcast attack against NTRU. (English)Zbl 1305.94041

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 124-137 (2012).
MSC:  94A60
Full Text:

### NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model. (English)Zbl 1294.94079

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 353-371 (2012).
MSC:  94A60
Full Text:

### Lower bounds of shortest vector lengths in random NTRU lattices. (English)Zbl 1354.68274

Agrawal, Manindra (ed.) et al., Theory and applications of models of computation. 9th annual conference, TAMC 2012, Beijing, China, May 16–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29951-3/pbk). Lecture Notes in Computer Science 7287, 143-155 (2012).
MSC:  68U05 68Q30
Full Text:

### Making NTRU as secure as worst-case problems over ideal lattices. (English)Zbl 1281.94057

Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 27-47 (2011).
MSC:  94A60
Full Text:

### NTRU over rings beyond $$\mathbb{Z}$$. (English)Zbl 1200.94050

MSC:  94A60 11T71 13G05
Full Text:

### Speed records for NTRU. (English)Zbl 1272.94035

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 73-88 (2010).
MSC:  94A60
Full Text:

Full Text:

### Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge. (English)Zbl 1267.94104

Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 198-213 (2009).
MSC:  94A60 94A62
Full Text:

MSC:  68P25
Full Text:

MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### MaTRU: A new NTRU-based cryptosystem. (English)Zbl 1153.94362

Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 232-243 (2005).
MSC:  94A60
Full Text:

### A key encapsulation mechanism for NTRU. (English)Zbl 1122.94403

Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 410-427 (2005).
MSC:  94A60
Full Text:

### Cryptanalysis of PASS II and MiniPass. (English)Zbl 1122.94419

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 159-168 (2005).
MSC:  94A62 94A60
Full Text:

Full Text:

### A faster lattice reduction method using quantum search. (English)Zbl 1205.68160

Ibaraki, Toshihide (ed.) et al., Algorithms and computation. 14th international symposium, ISAAC 2003, Kyoto, Japan, December 15–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20695-7/pbk). Lect. Notes Comput. Sci. 2906, 199-208 (2003).
MSC:  68Q12 68Q05 81P68 94A60
Full Text:

### Computing the $$M = UU^t$$ integer matrix decomposition. (English)Zbl 1123.94338

Paterson, Kenneth G. (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20663-9/pbk). Lect. Notes Comput. Sci. 2898, 223-233 (2003).
MSC:  94A60 15B36
Full Text:

### The impact of decryption failures on the security of NTRU encryption. (English)Zbl 1122.94377

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 226-246 (2003).
MSC:  94A60
Full Text:

Full Text:

### Key recovery attacks on NTRU without ciphertext validation routine. (English)Zbl 1044.94528

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 274-284 (2003).
MSC:  94A60
Full Text:

### Ring units in iterated cyclic extensions, and in NTRU. (English)Zbl 1058.11067

MSC:  11T30 11T71 94A60

### Cryptanalysis of the revised NTRU signature scheme. (English)Zbl 1055.94015

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 299-320 (2002).
MSC:  94A60 94A62 11H71
Full Text:

### A variant of NTRU with non-invertible polynomials. (English)Zbl 1033.94510

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 62-70 (2002).
MSC:  94A60 11L07
Full Text:

### Analysis and improvements of NTRU encryption paddings. (English)Zbl 1026.94538

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 210-225 (2002).
MSC:  94A60 68P25
Full Text:

### Cryptanalysis of the NTRU signature scheme (NSS) from EUROCRYPT 2001. (English)Zbl 1062.94547

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 1-20 (2001).
MSC:  94A60 68P25 94A62
Full Text:

### NTRU in constrained devices. (English)Zbl 1012.94548

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 262-272 (2001).
MSC:  94A60 68P25
Full Text:

### NSS: an NTRU lattice-based signature scheme. (English)Zbl 0981.94039

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 211-228 (2001).
MSC:  94A62
Full Text:

### Optimizations for NTRU. (English)Zbl 0987.94027

Alster, Kazimierz (ed.) et al., Public-key cryptography and computational number theory. Proceedings of the international conference organized by the Stefan Banach International Mathematical Center, Warsaw, Poland, September 11-15, 2000. Berlin: de Gruyter. 77-88 (2001).
MSC:  94A60 11T71

### A chosen-ciphertext attack against NTRU. (English)Zbl 0995.94525

Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 20-35 (2000).
MSC:  94A60

### Lattice reduction in cryptology: An update. (English)Zbl 0980.94010

Bosma, Wieb (ed.), Algorithmic number theory. 4th international symposium. ANTS-IV, Leiden, the Netherlands, July 2-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1838, 85-112 (2000).
MSC:  94A60 11Y16

all top 5

all top 5

all top 3

all top 3