咨询与建议

限定检索结果

文献类型

  • 84 篇 期刊文献
  • 48 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 66 篇 计算机科学与技术...
    • 49 篇 电气工程
    • 20 篇 信息与通信工程
    • 16 篇 电子科学与技术(可...
    • 7 篇 软件工程
    • 3 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 60 篇 理学
    • 53 篇 数学
    • 4 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 6 篇 医学
    • 6 篇 临床医学
    • 1 篇 特种医学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 哲学
    • 1 篇 哲学

主题

  • 134 篇 lll algorithm
  • 23 篇 lattice reductio...
  • 22 篇 lattice
  • 20 篇 rsa
  • 16 篇 cryptanalysis
  • 13 篇 lattice basis re...
  • 13 篇 mimo
  • 12 篇 coppersmith's me...
  • 11 篇 lattices
  • 7 篇 mmse
  • 7 篇 factorization
  • 6 篇 ntru
  • 6 篇 closest vector p...
  • 6 篇 lattice-reductio...
  • 6 篇 signal estimatio...
  • 6 篇 semi-infinite li...
  • 5 篇 shortest vector ...
  • 5 篇 unravelled linea...
  • 5 篇 explicit auxilia...
  • 5 篇 cryptography

机构

  • 7 篇 univ electrocomm...
  • 7 篇 chinese acad sci...
  • 6 篇 chinese acad sci...
  • 4 篇 univ chinese aca...
  • 3 篇 ewha womans univ...
  • 3 篇 hong kong baptis...
  • 3 篇 southwest univ c...
  • 3 篇 ewha womans univ...
  • 2 篇 indian stat inst...
  • 2 篇 univ saskatchewa...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ london impe...
  • 2 篇 tsinghua univ de...
  • 2 篇 stellenbosch uni...
  • 2 篇 univ chinese aca...
  • 2 篇 aristotle univ t...
  • 2 篇 indian stat inst...
  • 2 篇 univ caen basse ...
  • 2 篇 beijing res inst...
  • 2 篇 univ tokyo

作者

  • 9 篇 fujino tadashi
  • 8 篇 hu lei
  • 8 篇 sarkar santanu
  • 8 篇 xu jun
  • 6 篇 wu qiang
  • 6 篇 peng liqiang
  • 5 篇 huang zhangjie
  • 5 篇 nitaj abderrahma...
  • 5 篇 kunihiro noboru
  • 4 篇 bi jingguo
  • 4 篇 qiao sanzheng
  • 4 篇 luk franklin t.
  • 4 篇 maitra subhamoy
  • 3 篇 ling cong
  • 3 篇 bremner murray r...
  • 3 篇 hou wei
  • 3 篇 takagi tsuyoshi
  • 3 篇 pan yanbin
  • 3 篇 takayasu atsushi
  • 3 篇 lee hyang-sook

语言

  • 123 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"主题词=LLL Algorithm"
134 条 记 录,以下是91-100 订阅
排序:
A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys  19th
A Lattice Attack on Homomorphic NTRU with Non-invertible Pub...
收藏 引用
19th International Conference on Information and Communications Security (ICICS)
作者: Ahn, Soyoung Lee, Hyang-Sook Lim, Seongan Yie, Ikkwon Ewha Womans Univ Dept Math Seoul South Korea Ewha Womans Univ Inst Math Sci Seoul South Korea Inha Univ Dept Math Incheon South Korea
In 2011, Stehle and Steinfeld modified the original NTRU to get a provably IND-CPA secure NTRU under the hardness assumption of standard worst-case problems over ideal lattices. In 2012, Lopez-Alt et al. proposed the ... 详细信息
来源: 评论
Decoding by Embedding: Correct Decoding Radius and DMT Optimality
Decoding by Embedding: Correct Decoding Radius and DMT Optim...
收藏 引用
IEEE International Symposium on Information Theory (ISIT)
作者: Ling, Cong Liu, Shuiyin Luzzi, Laura Stehle, Damien Univ London Imperial Coll Sci Technol & Med Dept Elect & Elect Engn London SW7 2AZ England
In lattice-coded multiple-input multiple-output (MIMO) systems, optimal decoding amounts to solving the closest vector problem (CVP). Embedding is a powerful technique for the approximate CVP, yet its remarkable perfo... 详细信息
来源: 评论
Enhancing an Attack to DSA Schemes  8th
Enhancing an Attack to DSA Schemes
收藏 引用
8th International Conference on Algebraic Informatics (CAI)
作者: Adamoudis, Marios Draziotis, Konstantinos A. Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki Greece Aristotle Univ Thessaloniki Dept Informat Thessaloniki Greece
In this paper, we improve the theoretical background of the attacks on the DSA schemes of a previous paper, and we present some new more practical attacks.
来源: 评论
Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013  1
收藏 引用
12th International Conference on Information Security Practice and Experience (ISPEC)
作者: Bi, Jingguo Liu, Jiayang Tsinghua Univ Inst Adv Study Beijing 100084 Peoples R China State Key Lab Cryptol Beijing 100878 Peoples R China Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China
At TrustCom 2013, Govinda Ramaiah and Vijaya Kumari proposed a new protocol for verifying the integrity of the data stored at the remote cloud server, based on a practical version of homomorphic encryption based on in... 详细信息
来源: 评论
LOW-COMPLEXITY LATTICE REDUCTION ARCHITECTURE USING INTERPOLATION-BASED QR DECOMPOSITION FOR MIMO-OFDM SYSTEMS
LOW-COMPLEXITY LATTICE REDUCTION ARCHITECTURE USING INTERPOL...
收藏 引用
IEEE Asia Pacific Conference on Circuits and Systems (APCCAS)
作者: Liu, I-Wen Liao, Chun-Fu Lan, Fang-Chun Huang, Yuan-Hao Natl Tsing Hua Univ Inst Commun Engn Hsinchu Taiwan Natl Tsing Hua Univ Dept Elect Engn Hsinchu Taiwan
Lattice reduction (LR) technique is well known for its capability of improving MIMO detection performance. Nevertheless, the complexity increases significantly when LR is applied to all sub-carriers in the orthogonal-... 详细信息
来源: 评论
Efficient Quantization Scheme for Lattice-Reduction Aided MIMO Detection
Efficient Quantization Scheme for Lattice-Reduction Aided MI...
收藏 引用
International Conference on Advanced Technologies for Communications (ATC)
作者: Hou, Wei Fujino, Tadashi Kojima, Toshiharu Univ Electrocommun Grad Sch Informat & Commun Engn & Informat Tokyo 1828585 Japan
In this paper, we present an efficient quantization scheme for lattice-reduction (LR) aided (LRA) MIMO detection using Gram-Schmidt orthogonalization. For the LRA detection, the quantization step applies the simple ro... 详细信息
来源: 评论
Factoring RSA Moduli with Weak Prime Factors  1st
Factoring RSA Moduli with Weak Prime Factors
收藏 引用
1st International Conference on Codes, Cryptology, and Information Security (C2SI) In Honor of Thierry Berger
作者: Nitaj, Abderrahmane Rachidi, Tajjeeddine Univ Caen Basse Normandie Lab Math Nicolas Oresme Caen France Al Akhawayn Univ Sch Sci & Engn Ifrane Morocco
In this paper, we study the problem of factoring an RSA modulus N = pq in polynomial time, when p is a weak prime, that is, p can be expressed as ap = u(0) + M(1)u(1) + ... + M(k)u(k) for some k integers M-1, ... , M-... 详细信息
来源: 评论
Recovering a Sum of Two Squares Decomposition Revisited  11th
Recovering a Sum of Two Squares Decomposition Revisited
收藏 引用
11th China International Conference on Information Security and Cryptology (Inscrypt)
作者: Zhang, Xiaona Wang, Li-Ping Xu, Jun Hu, Lei Peng, Liqiang Huang, Zhangjie Liu, Zeyi Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing 100093 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100093 Peoples R China Univ Chinese Acad Sci Beijing Peoples R China
Recently, in [6] Gomez et al. presented algorithms to recover a decomposition of an integer N = rA(2) + sB(2), where N, r, s are positive integers, and A, B are the wanted unknowns. Their first algorithm recovers two ... 详细信息
来源: 评论
New Attacks on the RSA Cryptosystem
New Attacks on the RSA Cryptosystem
收藏 引用
7th International Conference on Cryptology in Africa (AFRICACRYPT)
作者: Nitaj, Abderrahmane Ariffin, Muhammad Rezal Kamel Nassr, Dieaa I. Bahig, Hatem M. Univ Caen Basse Normandie Lab Math Nicolas Oresme Caen France Inst Math Res Al Kindi Cryptog Res Lab Serdang Malaysia Univ Putra Malaysia Fac Sci Dept Math Serdang 43400 Malaysia Ain Shams Univ Fac Sci Dept Math Div Comp Sci Cairo Egypt
This paper presents three new attacks on the RSA cryptosystem. The first two attacks work when k RSA public keys (N-i, e(i)) are such that there exist k relations of the shape e(i)x-y(i)phi(N-i) = z(i) or of the shape... 详细信息
来源: 评论
New Results of Breaking the CLS Scheme from ACM-CCS 2014  24th
New Results of Breaking the CLS Scheme from ACM-CCS 2014
收藏 引用
24th International Conference on Information and Communications Security (ICICS)
作者: Gao, Jing Xu, Jun Wang, Tianyu Hu, Lei Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing 100093 Peoples R China
At ACM-CCS 2014, Cheon, Lee and Seo introduced a particularly fast additively homomorphic encryption scheme (CLS scheme) based on a new number theoretic assumption, the co-Approximate Common Divisor (co-ACD) assumptio... 详细信息
来源: 评论