咨询与建议

限定检索结果

文献类型

  • 84 篇 期刊文献
  • 48 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 66 篇 计算机科学与技术...
    • 49 篇 电气工程
    • 20 篇 信息与通信工程
    • 16 篇 电子科学与技术(可...
    • 7 篇 软件工程
    • 3 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 60 篇 理学
    • 53 篇 数学
    • 4 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 6 篇 医学
    • 6 篇 临床医学
    • 1 篇 特种医学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 哲学
    • 1 篇 哲学

主题

  • 134 篇 lll algorithm
  • 23 篇 lattice reductio...
  • 22 篇 lattice
  • 20 篇 rsa
  • 16 篇 cryptanalysis
  • 13 篇 lattice basis re...
  • 13 篇 mimo
  • 12 篇 coppersmith's me...
  • 11 篇 lattices
  • 7 篇 mmse
  • 7 篇 factorization
  • 6 篇 ntru
  • 6 篇 closest vector p...
  • 6 篇 lattice-reductio...
  • 6 篇 signal estimatio...
  • 6 篇 semi-infinite li...
  • 5 篇 shortest vector ...
  • 5 篇 unravelled linea...
  • 5 篇 explicit auxilia...
  • 5 篇 cryptography

机构

  • 7 篇 univ electrocomm...
  • 7 篇 chinese acad sci...
  • 6 篇 chinese acad sci...
  • 4 篇 univ chinese aca...
  • 3 篇 ewha womans univ...
  • 3 篇 hong kong baptis...
  • 3 篇 southwest univ c...
  • 3 篇 ewha womans univ...
  • 2 篇 indian stat inst...
  • 2 篇 univ saskatchewa...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ london impe...
  • 2 篇 tsinghua univ de...
  • 2 篇 stellenbosch uni...
  • 2 篇 univ chinese aca...
  • 2 篇 aristotle univ t...
  • 2 篇 indian stat inst...
  • 2 篇 univ caen basse ...
  • 2 篇 beijing res inst...
  • 2 篇 univ tokyo

作者

  • 9 篇 fujino tadashi
  • 8 篇 hu lei
  • 8 篇 sarkar santanu
  • 8 篇 xu jun
  • 6 篇 wu qiang
  • 6 篇 peng liqiang
  • 5 篇 huang zhangjie
  • 5 篇 nitaj abderrahma...
  • 5 篇 kunihiro noboru
  • 4 篇 bi jingguo
  • 4 篇 qiao sanzheng
  • 4 篇 luk franklin t.
  • 4 篇 maitra subhamoy
  • 3 篇 ling cong
  • 3 篇 bremner murray r...
  • 3 篇 hou wei
  • 3 篇 takagi tsuyoshi
  • 3 篇 pan yanbin
  • 3 篇 takayasu atsushi
  • 3 篇 lee hyang-sook

语言

  • 123 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"主题词=LLL Algorithm"
134 条 记 录,以下是91-100 订阅
排序:
On Deterministic Polynomial-time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
收藏 引用
DEFENCE SCIENCE JOURNAL 2012年 第2期62卷 122-126页
作者: Maitra, Subhamoy Sarkar, Santanu Indian Stat Inst Kolkata 700108 India
Let N = pq be the product of two large primes. Consider Chinese remainder theorem-Rivest, Shamir, Adleman (CRT-RSA) with the public encryption exponent e and private decryption exponents d(p), d(q). It is well known t... 详细信息
来源: 评论
Some bounds and limits in the theory of Riemann's zeta function
收藏 引用
JOURNAL OF MATHEMATICAL ANALYSIS AND APPLICATIONS 2012年 第1期396卷 199-214页
作者: Arias de Reyna, Juan van de Lune, Jan Univ Seville Fac Matemat E-41080 Seville Spain CWI NL-1009 AB Amsterdam Netherlands
For any real a > 0 we determine the supremum of the real sigma such that zeta(sigma + it) = a for some real t. For 0 1 the results turn out to be quite different. We also determine the supremum E of the real parts... 详细信息
来源: 评论
LOW-COMPLEXITY LATTICE REDUCTION ARCHITECTURE USING INTERPOLATION-BASED QR DECOMPOSITION FOR MIMO-OFDM SYSTEMS
LOW-COMPLEXITY LATTICE REDUCTION ARCHITECTURE USING INTERPOL...
收藏 引用
IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)
作者: Liu, I-Wen Liao, Chun-Fu Lan, Fang-Chun Huang, Yuan-Hao Natl Tsing Hua Univ Inst Commun Engn Hsinchu Taiwan Natl Tsing Hua Univ Dept Elect Engn Hsinchu Taiwan
Lattice reduction (LR) technique is well known for its capability of improving MIMO detection performance. Nevertheless, the complexity increases significantly when LR is applied to all sub-carriers in the orthogonal-... 详细信息
来源: 评论
An improved lll algorithm
收藏 引用
LINEAR ALGEBRA AND ITS APPLICATIONS 2008年 第2-3期428卷 441-452页
作者: Luk, Franklin T. Tracy, Daniel A. Rensselaer Polytech Inst Dept Comp Sci Troy NY 12180 USA
The lll algorithm has received a lot of attention as an effective numerical tool for preconditioning an integer least squares problem. However, the workings of the algorithm are not well understood. In this paper, we ... 详细信息
来源: 评论
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith's Methods
Inferring Sequences Produced by Nonlinear Pseudorandom Numbe...
收藏 引用
15th International Conference on Practice and Theory in Public Key Cryptography (PKC)
作者: Bauer, Aurelie Vergnaud, Damien Zapalowicz, Jean-Christophe Agence Natl Securite Syst Informat 51 Blvd Tour Maubourg F-75700 Paris 07 SP France CNRS Ecole Normale Super INRIA F-75230 Paris 05 France INRIA Rennes Bretagne Atlantique F-35042 Rennes France
Number-theoretic pseudorandom generators work by iterating an algebraic map F (public or private) over a residue ring Z(N) on a secret random initial seed value v 0 is an element of Z(N) to compute values v(n+1) - F(v... 详细信息
来源: 评论
Cryptanalysis of RSA with Constrained Low Public Exponent
Cryptanalysis of RSA with Constrained Low Public Exponent
收藏 引用
中国密码学会2012年会
作者: Luo Ping Zhou Haijian Key Laboratory for Information System Security Ministry of Education Tsinghua National Laboratory for Information Science and Technology(TNlist)School of Software Tsinghua University Beijing 100084 China
In this paper,we study the RSA cryptosystem with low public key e =Nα and constrained private key d Let μ be a small integer and d ≡ d'modeμ When d' =eγ is sufficiently small and 0 ≤ γ ≤μ-1/8a(1+√9 +... 详细信息
来源: 评论
Solving Generalized Small Inverse Problems
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2011年 第6期E94A卷 1274-1284页
作者: Kunihiro, Noboru Univ Tokyo Kashiwa Chiba 2778561 Japan
We introduce a "generalized small inverse problem (GSIP)" and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x(0), x(1),...x(n)) = x(0)h(x(1),...,x(n))+C = ... 详细信息
来源: 评论
THE TRACE PROBLEM FOR TOTALLY POSITIVE ALGEBRAIC INTEGERS
收藏 引用
JOURNAL OF THE AUSTRALIAN MATHEMATICAL SOCIETY 2011年 第3期90卷 341-354页
作者: Liang, Yanhua Wu, Qiang SW Univ China Dept Math Chongqing 400715 Peoples R China
Let a be a totally positive algebraic integer of degree d >= 2 and alpha(1) = alpha, alpha(2), ... alpha(d), be all its conjugates. We use explicit auxiliary functions to improve the known lower bounds of S-k/d, wh... 详细信息
来源: 评论
Decoding by Embedding: Correct Decoding Radius and DMT Optimality
Decoding by Embedding: Correct Decoding Radius and DMT Optim...
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Ling, Cong Liu, Shuiyin Luzzi, Laura Stehle, Damien Univ London Imperial Coll Sci Technol & Med Dept Elect & Elect Engn London SW7 2AZ England
In lattice-coded multiple-input multiple-output (MIMO) systems, optimal decoding amounts to solving the closest vector problem (CVP). Embedding is a powerful technique for the approximate CVP, yet its remarkable perfo... 详细信息
来源: 评论
LATENCY-CONSTRAINED LOW-COMPLEXITY LATTICE REDUCTION FOR MIMO-OFDM SYSTEMS
LATENCY-CONSTRAINED LOW-COMPLEXITY LATTICE REDUCTION FOR MIM...
收藏 引用
IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Liao, Chun-Fu Lan, Fang-Chun Huang, Yuan-Hao Chiu, Po-Lin Natl Tsing Hua Univ Inst Commun Engn Hsinchu Taiwan
Recent studies have investigated lattice-reduction (LR) preprocessing technique for multiple-input multiple-output (MIMO) detection. However, if LR is applied to the orthogonal-frequency-division-multiplexing (OFDM) s... 详细信息
来源: 评论