×

Found 32 Documents (Results 1–32)

100
MathJax

Finding closest lattice vectors using approximate Voronoi cells. (English) Zbl 1447.94033

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 3-22 (2019).
MSC:  94A60 68R05 68W30
PDF BibTeX XML Cite
Full Text: DOI

An experimental study of Kannan’s embedding technique for the search LWE problem. (English) Zbl 1452.94089

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 541-553 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Just take the average! An embarrassingly simple \(2^n\)-time algorithm for SVP (and CVP). (English) Zbl 1433.68474

Seidel, Raimund (ed.), 1st symposium on simplicity in algorithms. SOSA 2018, January 7–10, 2018, New Orleans, LA, USA. Co-located with the 29th ACM-SIAM symposium on discrete algorithms (SODA 2018). Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. OASIcs – OpenAccess Ser. Inform. 61, Article 12, 19 p. (2018).
MSC:  68U05 68W20 68W40
PDF BibTeX XML Cite
Full Text: DOI arXiv

(Gap/S)ETH hardness of SVP. (English) Zbl 1427.68101

Diakonikolas, Ilias (ed.) et al., Proceedings of the 50th annual ACM SIGACT symposium on theory of computing, STOC ’18, Los Angeles, CA, USA, June 25–29, 2018. New York, NY: Association for Computing Machinery (ACM). 228-238 (2018).
MSC:  68Q17
PDF BibTeX XML Cite
Full Text: DOI arXiv

Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications. (English) Zbl 1423.94115

Kaczorowski, Jerzy (ed.) et al., Number-theoretic methods in cryptology. First international conference, NuTMiC 2017, Warsaw, Poland, September 11–13, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10737, 142-160 (2018).
MSC:  94A60 68W30
PDF BibTeX XML Cite
Full Text: DOI

Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. (English) Zbl 1439.94062

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10769, 437-460 (2018).
MSC:  94A60 11Y16
PDF BibTeX XML Cite
Full Text: DOI

Speed-ups and time-memory trade-offs for tuple lattice sieving. (English) Zbl 1439.94033

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10769, 407-436 (2018).
MSC:  94A60 11Y16
PDF BibTeX XML Cite
Full Text: DOI

Approximate short vectors in ideal lattices of \(\mathbb{Q}(\zeta_{p^e})\) with precomputation of \({\mathrm {Cl}}(\mathcal{O}_K)\). (English) Zbl 1384.94035

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 374-393 (2018).
MSC:  94A60 81P94 81P68
PDF BibTeX XML Cite
Full Text: DOI

Sieving for closest lattice vectors (with preprocessing). (English) Zbl 1418.94052

Avanzi, Roberto (ed.) et al., Selected areas in cryptography – SAC 2016. 23rd international conference, St. John’s, NL, Canada, August 10–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10532, 523-542 (2017).
MSC:  94A60 11Y16 68W30
PDF BibTeX XML Cite
Full Text: DOI arXiv

Gauss sieve algorithm on GPUs. (English) Zbl 1383.94050

Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 39-57 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Search-to-decision reductions for lattice problems with approximation factors (slightly) greater than one. (English) Zbl 1398.68685

Jansen, Klaus (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. Proceedings of the 19th international workshop on approximation algorithms for combinatorial optimization problems, APPROX 2016, and the 20th international workshop on randomization and computation, RANDOM 2016, Paris, France, September 7–9, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-018-7). LIPIcs – Leibniz International Proceedings in Informatics 60, Article 19, 18 p. (2016).
MSC:  68W25 52C07 68Q25
PDF BibTeX XML Cite
Full Text: DOI arXiv

Sieving for shortest vectors in lattices using angular locality-sensitive hashing. (English) Zbl 1336.94060

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 3-22 (2015).
MSC:  94A60 68W30
PDF BibTeX XML Cite
Full Text: DOI Link

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing. (English) Zbl 1370.94521

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 101-118 (2015).
MSC:  94A60 68W30
PDF BibTeX XML Cite
Full Text: DOI Link

A fast phase-based enumeration algorithm for SVP challenge through \(y\)-sparse representations of short lattice vectors. (English) Zbl 1356.94054

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, Korea, December 3–5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 101-113 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Solving random subset sum problem by \(l_p\)-norm SVP oracle. (English) Zbl 1335.94051

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 399-410 (2014).
MSC:  94A60 11Y16
PDF BibTeX XML Cite
Full Text: DOI

Quantum algorithms for the subset-sum problem. (English) Zbl 1295.68127

Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 16-33 (2013).
PDF BibTeX XML Cite
Full Text: DOI Link

A deterministic single exponential time algorithm for most lattice problems based on Voronoi cell computations. (English) Zbl 1293.68172

Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 351-358 (2010).
PDF BibTeX XML Cite
Full Text: DOI Link

Rigorous and efficient short lattice vectors enumeration. (English) Zbl 1206.94086

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 390-405 (2008).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Classification

all top 3

Software