The Two Faces of Lattices in Cryptology
- 17 September 2001
- book chapter
- Published by Springer Nature
- p. 146-180
- https://doi.org/10.1007/3-540-44670-2_12
Abstract
No abstract availableKeywords
This publication has 73 references indexed in Scilit:
- The hardness of the closest vector problem with preprocessingIEEE Transactions on Information Theory, 2001
- Approximating shortest lattice vectors is not harder than approximating closest lattice vectorsInformation Processing Letters, 1999
- NTRU: A ring-based public key cryptosystemPublished by Springer Nature ,1998
- A Montgomery-like square root for the Number Field SievePublished by Springer Nature ,1998
- Eliminating decryption errors in the Ajtai-Dwork CryptosystemPublished by Springer Nature ,1997
- Improved low-density subset sum algorithmscomputational complexity, 1992
- Cryptanalysis of short RSA secret exponentsIEEE Transactions on Information Theory, 1990
- A more efficient algorithm for lattice basis reductionJournal of Algorithms, 1988
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976