A more efficient algorithm for lattice basis reduction
References (14)
On breaking the iterated Merkle-Hellman public key cryptosystem
- et al.
Generalization of the euclidean algorithm for real numbers to all dimensions higher than two
Bull. Amer. Math. Soc. (N.S.)
(1979) - et al.
Linear congruential generators do not produce random sequences
- et al.
The cryptographic security of truncated linearly related variables
- et al.
Polynomial time algorithms for finding integer relations among real numbers
On the complexity of finding short vectors in integer lattices
The computational complexity of simultaneous diophantine approximation problems
There are more references available in the full text version of this article.
Cited by (81)
An efficient lattice reduction using reuse technique blockwisely on NTRU
2016, Discrete Applied MathematicsPractical attacks on small private exponent RSA: new records and new insights
2023, Designs, Codes, and CryptographyPost-Quantum Cryptosystems: Open Problems and Solutions. Lattice-Based Cryptosystems
2023, Journal of Applied and Industrial MathematicsA Combination Reduction Algorithm and Its Application
2022, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)Studying lattice reduction algorithms improved by quick reordering technique
2021, International Journal of Information SecurityTowards Faster Polynomial-Time Lattice Reduction
2021, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- ∗
This research has been done at the University of Chicago, Department of Computer Science.
Copyright © 1988 Published by Elsevier Inc.