咨询与建议

限定检索结果

文献类型

  • 84 篇 期刊文献
  • 48 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 66 篇 计算机科学与技术...
    • 49 篇 电气工程
    • 20 篇 信息与通信工程
    • 16 篇 电子科学与技术(可...
    • 7 篇 软件工程
    • 3 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 60 篇 理学
    • 53 篇 数学
    • 4 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 6 篇 医学
    • 6 篇 临床医学
    • 1 篇 特种医学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 哲学
    • 1 篇 哲学

主题

  • 134 篇 lll algorithm
  • 23 篇 lattice reductio...
  • 22 篇 lattice
  • 20 篇 rsa
  • 16 篇 cryptanalysis
  • 13 篇 lattice basis re...
  • 13 篇 mimo
  • 12 篇 coppersmith's me...
  • 11 篇 lattices
  • 7 篇 mmse
  • 7 篇 factorization
  • 6 篇 ntru
  • 6 篇 closest vector p...
  • 6 篇 lattice-reductio...
  • 6 篇 signal estimatio...
  • 6 篇 semi-infinite li...
  • 5 篇 shortest vector ...
  • 5 篇 unravelled linea...
  • 5 篇 explicit auxilia...
  • 5 篇 cryptography

机构

  • 7 篇 univ electrocomm...
  • 7 篇 chinese acad sci...
  • 6 篇 chinese acad sci...
  • 4 篇 univ chinese aca...
  • 3 篇 ewha womans univ...
  • 3 篇 hong kong baptis...
  • 3 篇 southwest univ c...
  • 3 篇 ewha womans univ...
  • 2 篇 indian stat inst...
  • 2 篇 univ saskatchewa...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ london impe...
  • 2 篇 tsinghua univ de...
  • 2 篇 stellenbosch uni...
  • 2 篇 univ chinese aca...
  • 2 篇 aristotle univ t...
  • 2 篇 indian stat inst...
  • 2 篇 univ caen basse ...
  • 2 篇 beijing res inst...
  • 2 篇 univ tokyo

作者

  • 9 篇 fujino tadashi
  • 8 篇 hu lei
  • 8 篇 sarkar santanu
  • 8 篇 xu jun
  • 6 篇 wu qiang
  • 6 篇 peng liqiang
  • 5 篇 huang zhangjie
  • 5 篇 nitaj abderrahma...
  • 5 篇 kunihiro noboru
  • 4 篇 bi jingguo
  • 4 篇 qiao sanzheng
  • 4 篇 luk franklin t.
  • 4 篇 maitra subhamoy
  • 3 篇 ling cong
  • 3 篇 bremner murray r...
  • 3 篇 hou wei
  • 3 篇 takagi tsuyoshi
  • 3 篇 pan yanbin
  • 3 篇 takayasu atsushi
  • 3 篇 lee hyang-sook

语言

  • 123 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"主题词=LLL Algorithm"
134 条 记 录,以下是1-10 订阅
排序:
A physical study of the lll algorithm
收藏 引用
Journal of Number Theory 2023年 244卷 339-368页
作者: Ding, Jintai Kim, Seungki Takagi, Tsuyoshi Wang, Yuntao Yang, Bo-yin Tsinghua University China University of Cincinnati United States University of Tokyo Japan Osaka University Japan Academia Sinica China
This paper presents a study of the lll algorithm from the perspective of statistical physics. Based on our experimental and theoretical results, we suggest that interpreting lll as a sandpile model may help understand... 详细信息
来源: 评论
Algebraic number fields and the lll algorithm
收藏 引用
JOURNAL OF SYMBOLIC COMPUTATION 2024年 121卷
作者: Uray, M. J. Eotvos Lorand Univ Fac Informat Dept Comp Algebra Pazmany Peter Setany 1-C H-1117 Budapest Hungary
In this paper we analyze the computational costs of various operations and algorithms in algebraic number fields using exact arithmetic. Let K be an algebraic number field. In the first half of the paper, we calculate... 详细信息
来源: 评论
Performance Evaluation of Lower Complexity Hybrid-Fix-and-Round-lll algorithm for MIMO System
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 2018年 第6期12卷 2554-2580页
作者: Lv, Huazhang Network Technol Res Inst China Unicorn Innovat Ctr 5G Beijing Peoples R China
Lenstra-Lenstra-Lovasz (lll) is an effective receiving algorithm for Multiple-Input-Multiple-Output (MIMO) systems, which is believed can achieve full diversity in MIMO detection of fading channels. However, the lll a... 详细信息
来源: 评论
Storage efficient algorithm for Hermite Normal Form using lll
收藏 引用
LINEAR ALGEBRA AND ITS APPLICATIONS 2021年 613卷 183-200页
作者: Cho, Gook Hwa Lee, Hyang-Sook Lim, Seongan Kim, Yoonjeong Ewha Womans Univ Inst Math Sci Seoul South Korea Ewha Womans Univ Dept Math Seoul South Korea DuDu Informat Tech Inc Seoul South Korea
Computing HNF has a long history, but designing a storage efficient algorithm is a challenging issue for matrices of large sizes. One of the main challenges in the design of storage efficient HNF algorithm is to contr... 详细信息
来源: 评论
Deep lll on Module Lattices  27th
Deep LLL on Module Lattices
收藏 引用
27th International Conference on Information Security
作者: Zhou, Yang Cao, Heyang Wang, Mingsheng Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Chinese Acad Sci Key Lab Cyberspace Secur Def Inst Informat Engn Beijing Peoples R China
The lll algorithm, renowned for its application to Euclidean lattices, plays a crucial role in lattice cryptanalysis by offering a standard method for refining lattice bases. With the increasing importance of module l... 详细信息
来源: 评论
An optimal bound for factoring unbalanced RSA moduli by solving Generalized Implicit Factorization Problem
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-24页
作者: Zhang, Ran Bi, Jingguo Li, Lixiang Peng, Haipeng Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China
The integer factorization problem, concerning the product of two primes N = pq, has been a focal point for researchers since its rise to prominence with the RSA algorithm, a renowned public key scheme. It is well know... 详细信息
来源: 评论
Improved Herrmann-May's Attack with Merging Variables and Lower lll Bound  19th
Improved Herrmann-May's Attack with Merging Variables and Lo...
收藏 引用
19th International Conference on Information Security and Cryptology (Inscrypt)
作者: Cheng, Qingfeng Zhao, Chunzhi Cao, Jinzheng Wei, Fushan Informat Engn Univ Zhengzhou 450001 Peoples R China
Using side information to attack RSA is a practical method. In reality, it's possible to intercept some bits of an unknown divisor p of a known composite integer N for us. Then we can utilize Coppersmith's met... 详细信息
来源: 评论
On the largest value of the solutions of Erdős' last equation
收藏 引用
INTERNATIONAL JOURNAL OF NUMBER THEORY 2025年 第0期
作者: Luca, Florian Pink, Istvan Sandor, Csaba Stellenbosch Univ Math Div Stellenbosch South Africa Univ Debrecen Inst Math POB 400 H-4002 Debrecen Hungary Univ Salzburg Hellbrunnerstr 34 A-I5020 Salzburg Austria Budapest Univ Technol & Econ Inst Math Dept Stochast Muegyetem Rkp 3 H-1111 Budapest Hungary HUN REN Alfred Renyi Inst Math Realtanoda Utca 13-15 H-1053 Budapest Hungary MTA HUN REN RI Lendulet Momentum Arithmet Combinat Realtanoda Utca 13-15 H-1053 Budapest Hungary
Let n be a positive integer. The Diophantine equation n(x(1) + x(2) + & ctdot;+ x(n)) = x(1)x(2 )& mldr;x(n), 1 infinity as n ->infinity and determine all tuples (n, x(1), & mldr;, x(n)) with x(n) <=... 详细信息
来源: 评论
On the Diophantine equation Fnx + Fkx = Fmy
收藏 引用
RAMANUJAN JOURNAL 2025年 第2期67卷 1-37页
作者: Berczes, Attila Hajdu, Lajos Luca, Florian Pink, Istvan Univ Debrecen Inst Math POB 400 H-4002 Debrecen Hungary HUN REN Equat Funct Curves & their Applicat Res Gr Debrecen Hungary Stellenbosch Univ Math Div Stellenbosch South Africa Univ Salzburg Hellbrunner str 34-I A-5020 Salzburg Austria
In this paper, we find all solutions of the Diophantine equation F-n(x) + F-k(x) = F-m(y), where {F-m}(m >= 0 )is the Fibonacci sequence.
来源: 评论
Security Analysis of Hybrid Attack for NTRU-Class Encryption Schemes
收藏 引用
IEEE ACCESS 2023年 11卷 109939-109952页
作者: Levina, Alla Kadykov, Victor Valluri, Maheswara Rao St Petersburg Electrotech Univ LETI Lab Fundamentals Intelligent Syst LETI St Petersburg 197376 Russia Quinfosystems Pvt Ltd Telangana 500072 India
One of the significant post-quantum cryptographic candidates is the NTRU public key cryptosystem. It operates on polynomial rings, where the parameter largely determines the security of the system. Although NTRU is be... 详细信息
来源: 评论