<--- Back to Details
First PageDocument Content
Lattice points / Cryptography / Computational number theory / Vectors / Lattice problem / Lattice-based cryptography / Lattice / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Algorithm / Algebra / Mathematics / Linear algebra
Date: 2012-07-19 15:34:39
Lattice points
Cryptography
Computational number theory
Vectors
Lattice problem
Lattice-based cryptography
Lattice
Lenstra–Lenstra–Lovász lattice basis reduction algorithm
Algorithm
Algebra
Mathematics
Linear algebra

Lattice Enumeration using Extreme Pruning Nicolas Gama1 , Phong Q. Nguyen2 , and Oded Regev3 1 GREYC and ENSICAEN, France. INRIA and ENS, France. http://www.di.ens.fr/~pnguyen/.

Add to Reading List

Source URL: www.iacr.org

Download Document from Source Website

File Size: 268,60 KB

Share Document on Facebook

Similar Documents

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Shi Bai1 , Tancrède Lepoint3 , Adeline Roux-Langlois4 , Amin Sakzad5 , Damien Stehlé2 , and Ron S

DocID: 1xTbf - View Document

Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS  October, 3rd, 2016

Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS October, 3rd, 2016

DocID: 1tO6O - View Document

Lattice-Based Cryptography in Java Advisor(s): Christian Hanser and Sebastian Ramacher Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Lattice-Based Cryptography in Java Advisor(s): Christian Hanser and Sebastian Ramacher Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1s7AV - View Document

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology  `

¨ Bases) Interactions between Computer Algebra (Grobner and Cryptology `

DocID: 1qRIx - View Document

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

DocID: 1pUoS - View Document