## Found 151 Documents (Results 1–100)

100
MathJax

MSC:  94A60
Full Text:

Full Text:

Full Text:

Full Text:

### Lattice reformulation cuts. (English)Zbl 1479.90134

MSC:  90C10 11H06
Full Text:

### Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementation. (English)Zbl 1473.94121

MSC:  94A60 11Y16
Full Text:

### Dynamic self-dual DeepBKZ lattice reduction with free dimensions. (English)Zbl 07388997

Giri, Debasis (ed.) et al., Proceedings of the sixth international conference on mathematics and computing, ICMC 2020, Gangtok, Sikkim, India, March 18–20, 2020. Singapore: Springer. Adv. Intell. Syst. Comput. 1262, 377-391 (2021).
MSC:  68-XX 94-XX
Full Text:

Full Text:

### A survey of solving SVP algorithms and recent strategies for solving the SVP challenge. (English)Zbl 1459.94150

Takagi, Tsuyoshi (ed.) et al., International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25–27, 2019. Singapore: Springer. Math. Ind. (Tokyo) 33, 189-207 (2021).
MSC:  94A60 81P94
Full Text:

### Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices. (English)Zbl 1474.94070

MSC:  94A60 68M11
Full Text:

MSC:  94A60
Full Text:

Full Text:

### Analysis of DeepBKZ reduction for finding short lattice vectors. (English)Zbl 1465.11236

MSC:  11Y16 68W30 68R01
Full Text:

### Self-dual DeepBKZ for finding short lattice vectors. (English)Zbl 1448.94235

MSC:  94A60 68P25 68W30
Full Text:

### Successful cryptanalytic attacks upon RSA moduli $$N=pq$$. (English)Zbl 1455.94100

MSC:  94A60 11Y16
Full Text:

### A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths. (English)Zbl 1431.68084

MSC:  68R05 68W40 94A60
Full Text:

### Computing an LLL-reduced basis of the orthogonal latice. (English)Zbl 1467.11121

Arreche, Carlos (ed.), Proceedings of the 43rd international symposium on symbolic and algebraic computation, ISSAC 2018, New York, NY, USA, July 16–19, 2018. New York, NY: Association for Computing Machinery (ACM). 127-133 (2018).
MSC:  11Y16 68W30
Full Text:

### A verified efficient implementation of the LLL basis reduction algorithm. (English)Zbl 1409.68252

Barthe, Gilles (ed.) et al., LPAR-22. 22nd international conference on logic for programming, artificial intelligence and reasoning, Awassa, Ethiopia, November 17–21, 2018. Selected papers. Manchester: EasyChair. EPiC Ser. Comput. 57, 164-180 (2018).
MSC:  68T15
Full Text:

### Development of a dual version of DeepBKZ and its application to solving the LWE challenge. (English)Zbl 1423.94117

Joux, Antoine (ed.) et al., Progress in cryptology – AFRICACRYPT 2018. 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10831, 162-182 (2018).
MSC:  94A60 68W30
Full Text:

### Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications. (English)Zbl 1423.94115

Kaczorowski, Jerzy (ed.) et al., Number-theoretic methods in cryptology. First international conference, NuTMiC 2017, Warsaw, Poland, September 11–13, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10737, 142-160 (2018).
MSC:  94A60 68W30
Full Text:

### Computing explicit isomorphisms with full matrix algebras over $$\mathbb {F}_q(x)$$. (English)Zbl 1391.16032

MSC:  16S50 68W30 16Z05
Full Text:

### Fast lattice basis reduction suitable for massive parallelization and its application to the shortest vector problem. (English)Zbl 1439.94062

Abdalla, Michel (ed.) et al., Public-key cryptography – PKC 2018. 21st IACR international conference on practice and theory of public-key cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10769, 437-460 (2018).
MSC:  94A60 11Y16
Full Text:

MSC:  94A55
Full Text:

### On the lattice distortion problem. (English)Zbl 1397.68089

Sankowski, Piotr (ed.) et al., 24th annual European symposium on algorithms, ESA 2016, Aarhus, Denmark, August 22–24, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-015-6). LIPIcs – Leibniz International Proceedings in Informatics 57, Article 9, 17 p. (2016).
Full Text:

### Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator. (English)Zbl 1385.94007

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 789-819 (2016).
MSC:  94A60 68W30
Full Text:

### Monotone and consistent discretization of the Monge-Ampère operator. (English)Zbl 1416.65400

MSC:  65N06 35J96
Full Text:

Full Text:

### Critical 4-reduced basis and its construction. (Chinese. English summary)Zbl 1349.11100

MSC:  11H55 15A21

### Information transfer fidelity in spin networks and ring-based quantum routers. (English)Zbl 1333.81077

MSC:  81P45 94A40 81Q37
Full Text:

### Attacking RSA with a composed decryption exponent using unravelled linearization. (English)Zbl 1400.94150

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 207-219 (2015).
MSC:  94A60
Full Text:

### Extremal families of cubic Thue equations. (English. French summary)Zbl 1395.11049

MSC:  11D25 11E76 11J86
Full Text:

### Ideal forms of Coppersmith’s theorem and Guruswami-Sudan list decoding. (English)Zbl 1355.65064

MSC:  65H04 94B35 12Y05
Full Text:

### A parallel Jacobi-type lattice basis reduction algorithm. (English)Zbl 1463.65454

MSC:  65Y10 65K05 65Y05

### LLL reducing with the most significant bits. (English)Zbl 1325.68298

Nabeshima, Katsusuke (ed.), Proceedings of the 39th international symposium on symbolic and algebraic computation, ISSAC 2014, Kobe, Japan, July 23–25, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2501-1). 367-374 (2014).
MSC:  68W30 11H06 11Y16
Full Text:

### A lattice rational approximation algorithm for AFSRs over quadratic integer rings. (English)Zbl 1345.94026

Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 200-211 (2014).
MSC:  94A55
Full Text:

Full Text:

### On the successive minima of subbases of low-dimensional lattices. (English)Zbl 1305.11057

MSC:  11H50 11H55
Full Text:

### Sparse non-negative stencils for anisotropic diffusion. (English)Zbl 1365.68451

MSC:  68U10 94A08
Full Text:

Full Text:

### Approximate common divisors via lattices. (English)Zbl 1344.11085

Howe, Everett W. (ed.) et al., ANTS X. Proceedings of the tenth algorithmic number theory symposium, San Diego, CA, USA, July 9–13, 2012. Berkeley, CA: Mathematical Sciences Publishers (MSP) (ISBN 978-1-935107-00-2/hbk; 978-1-935107-01-9/ebook). The Open Book Series 1, 271-293 (2013).
MSC:  11Y16 94A60 94B35
Full Text:

### Applications of strong Gröbner bases over Euclidean domains. (English)Zbl 1285.13037

MSC:  13P10 11Y16 11Y40
Full Text:

### Cryptanalysis of a public-key scheme based on the Chinese remainder theorem. (Chinese. English summary)Zbl 1265.94041

MSC:  94A60 11T71

Full Text:

### Full lattice basis reduction on graphics cards. (English)Zbl 1305.68080

Armknecht, Frederik (ed.) et al., Research in cryptology. 4th Western European workshop, WEWoRC 2011, Weimar, Germany, July 20–22, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34158-8/pbk). Lecture Notes in Computer Science 7242, 30-44 (2012).
MSC:  68P25 94A60 68W10
Full Text:

Full Text:

### Lattice basis reduction. An introduction to the LLL algorithm and its applications. (English)Zbl 1237.68007

Pure and Applied Mathematics (Boca Raton) 300. Boca Raton, FL: CRC Press (ISBN 978-1-4398-0702-6/hbk; 978-1-4398-0704-0/ebook). xvii, 316 p. (2012).
Full Text:

### Vector rational number reconstruction. (English)Zbl 1323.68587

Leykin, Anton (ed.), Proceedings of the 36th international symposium on symbolic and algebraic computation, ISSAC 2011, San Jose, CA, USA, June 7–11, 2011. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-0675-1). 51-58 (2011).
MSC:  68W30 11Y16
Full Text:

### An LLL-reduction algorithm with quasi-linear time complexity, extended abstract. (English)Zbl 1288.68294

Proceedings of the 43rd annual ACM symposium on theory of computing, STOC ’11. San Jose, CA, USA, June 6–8, 2011. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-0691-1). 403-412 (2011).
MSC:  68W30 68Q25 15A03
Full Text:

### Some Diophantine equations from finite group theory: $$\Phi_m(x)=2p^n-1$$. (English)Zbl 1231.11039

MSC:  11D61 11Y50
Full Text:

### Cryptanalysis of a quadratic knapsack cryptosystem. (English)Zbl 1217.94131

MSC:  94A62 68P25 94A60
Full Text:

Full Text:

### Branching on hyperplane methods for mixed integer linear and convex programming using adjoint lattices. (English)Zbl 1219.90110

MSC:  90C11 90C05 90C25
Full Text:

MSC:  65F05
Full Text:

### Better key sizes (and attacks) for LWE-based encryption. (English)Zbl 1284.94088

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 319-339 (2011).
MSC:  94A60
Full Text:

### Some sufficient conditions of the equivalence between successive minimal independent vectors and Minkowski-reduced basis in lattices. (Chinese. English summary)Zbl 1479.11118

MSC:  11H50 11H55

Full Text:

### Quadratic compact knapsack public-key cryptosystem. (English)Zbl 1189.94049

MSC:  94A60 11T71
Full Text:

### Lattice based extended formulations for integer linear equality systems. (English)Zbl 1184.90104

MSC:  90C10 45A05 11Y50
Full Text:

MSC:  94A29
Full Text:

MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

Full Text:

MSC:  94A60
Full Text:

### An example to demonstrate the importance of using ellipsoidal norm in lattice basis reduction for branching on hyperplane algorithms. (English)Zbl 1173.90479

MSC:  90C10 11Y50

Full Text:

### A new lattice construction for partial key exposure attack for RSA. (English)Zbl 1220.94032

Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 34-53 (2009).
MSC:  94A60
Full Text:

### An application of lattice basis reduction to polynomial identities for algebraic structures. (English)Zbl 1173.17001

MSC:  17-08 17A40 68W30
Full Text:

Full Text:

### Lattice basis reduction algorithms and multi-dimensional continued fractions. (English)Zbl 1179.11050

MSC:  11Y16 94A55 11J70
Full Text:

### Toward a rigorous variation of Coppersmith’s algorithm on three variables. (English)Zbl 1141.94341

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 361-378 (2007).
MSC:  94A60 11Y16 68W30
Full Text:

MSC:  94A60
Full Text:

### Enumeration results on the joint linear complexity of multisequences. (English)Zbl 1156.94328

MSC:  94A55 11T71
Full Text:

### A partial key exposure attack on RSA using a 2-dimensional lattice. (English)Zbl 1156.94355

Katsikas, Sokratis K. (ed.) et al., Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). Lecture Notes in Computer Science 4176, 203-216 (2006).
MSC:  94A60
Full Text:

### Reconstructing noisy polynomial evaluation in residue rings. (English)Zbl 1178.68220

MSC:  68P25 68W05
Full Text:

### The maximum of the smallest maximal coordinate of the minimum vectors in 6-lattices equals 1. (English)Zbl 1078.52012

MSC:  52C07 11H55
Full Text:

### Hard equality constrained integer knapsacks. (English)Zbl 1082.90066

Math. Oper. Res. 29, No. 3, 724-738 (2004); corrigendum ibid. 31, No. 4, p. 846 (2006).
MSC:  90C10 11Y50 11D04
Full Text:

### Lattice basis reduction in optimization: selected topics. (English)Zbl 1074.90029

Hoşten, Serkan (ed.) et al., Trends in optimization. American Mathematical Society short course, January 5–6, 2004, Phoenix, Arizona, USA. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-3584-X/hbk). Proceedings of Symposia in Applied Mathematics 61, 1-19 (2004).

### Efficient solution of rational conics. (English)Zbl 1022.11031

MSC:  11G30 11D09
Full Text:

MSC:  68T20
Full Text:

### Attacking the market split problem with lattice point enumeration. (English)Zbl 1056.90106

MSC:  90C10 90C08 11D04
Full Text:

### Non-standard approaches to integer programming. (English)Zbl 1130.90364

MSC:  90C10 90-02
Full Text:

### $$F[x]$$-lattice basis reduction algorithm and multisequence synthesis. (English)Zbl 1125.94318

MSC:  94A55 68W30
Full Text:

### Multisequence synthesis over an integral domain. (English)Zbl 1006.11083

Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 206-217 (2001).
MSC:  11Y16 11H06 94A60
Full Text:

### Fast reduction of ternary quadratic forms. (English)Zbl 1006.11080

Silverman, Joseph H. (ed.), Cryptography and lattices. 1st international conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2146, 32-44 (2001).
MSC:  11Y16 11H55 68Q25
Full Text:

### Information leakage attacks against smart card implementations of the elliptic curve digital signature algorithm. (English)Zbl 1002.68681

Attali, Isabelle (ed.) et al., Smart card programming and security. International conference on smart cards, E-smart 2001, Cannes, France, September 19-21, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2140, 211-219 (2001).
MSC:  68U99 68P25
Full Text:

### Solving a system of linear Diophantine equations with lower and upper bounds on the variables. (English)Zbl 1073.90528

MSC:  90C10 11Y50 11D04
Full Text:

### New results on lattice basis reduction in practice. (English)Zbl 0982.11072

Bosma, Wieb (ed.), Algorithmic number theory. 4th international symposium. ANTS-IV, Leiden, the Netherlands, July 2-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1838, 135-152 (2000).
MSC:  11Y16 11H55

### Cryptanalysis of RSA with private key $$d$$ less than $$N^{0. 292}$$. (English)Zbl 1001.94031

MSC:  94A60 11H71
Full Text:

### Market split and basis reduction: Towards a solution of the Cornuéjols-Dawande instances. (English)Zbl 0948.90108

Cornuéjols, Gérard (ed.) et al., Integer programming and combinatorial optimization. 7th international IPCO conference, Graz, Austria, June 9-11, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1610, 1-16 (1999).

Full Text:

Full Text:

### Solving a linear diophantine equation with lower and upper bounds on the variables. (English)Zbl 0910.90216

Bixby, Robert E. (ed.) et al., Integer programming and combinatorial optimization. 6th international IPCO conference, Houston, TX, USA, June 22–24, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1412, 229-242 (1998).
MSC:  90C10

Full Text:

### A natural lattice basis problem with applications. (English)Zbl 1044.11594

MSC:  11H55 52C07 68U15
Full Text:

### Small solutions to polynomial equations, and low exponent RSA vulnerabilities. (English)Zbl 0912.11056

MSC:  11Y16 94A60 11Y05
Full Text:

### A multiplicative attack using LLL algorithm on RSA signatures with redundancy. (English)Zbl 0882.94024

Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 221-234 (1997).

all top 5

all top 5

all top 5

all top 3

all top 3