搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: D. Boneh , G. Durfee
DOI: 10.1109/18.850673
关键词:
摘要: … is the product of two -bit primes. For simplicity, we assume … We are interested in finding a low-norm integer linear combination of the polynomials … that give rise to polynomials …
australasian conference on information security and privacy,2013, 引用: 7
Information Security Practice and Experience,2012, 引用: 15
The LLL Algorithm,2009, 引用: 143
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2013, 引用: 10
,2009, 引用: 0
Progress in Cryptology - AFRICACRYPT 2012,2012, 引用: 8
Information Security and Privacy,2014, 引用: 15
Lecture Notes in Computer Science,2012, 引用: 15
australasian conference on information security and privacy,2013, 引用: 17
Electronic Colloquium on Computational Complexity,2001, 引用: 1