搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Alexander May
DOI: 10.1007/978-3-642-02295-1_10
关键词:
摘要: Twenty five years ago, Lenstra, Lenstra and Lovász presented their celebrated LLL lattice reduction algorithm. Among the various applications of the LLL algorithm is a method due to …
australasian conference on information security and privacy,2013, 引用: 7
The LLL Algorithm,2009, 引用: 7
Information Security and Privacy,2014, 引用: 15
australasian conference on information security and privacy,2013, 引用: 17
Advances in Cryptology – ASIACRYPT 2012,2012, 引用: 30
Designs, Codes and Cryptography,2014, 引用: 29
australasian conference on information security and privacy,2012, 引用: 2
,2013, 引用: 1
public key cryptography,2014, 引用: 13
,2012, 引用: 1