咨询与建议

限定检索结果

文献类型

  • 84 篇 期刊文献
  • 48 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 66 篇 计算机科学与技术...
    • 49 篇 电气工程
    • 20 篇 信息与通信工程
    • 16 篇 电子科学与技术(可...
    • 7 篇 软件工程
    • 3 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 60 篇 理学
    • 53 篇 数学
    • 4 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 6 篇 医学
    • 6 篇 临床医学
    • 1 篇 特种医学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 哲学
    • 1 篇 哲学

主题

  • 134 篇 lll algorithm
  • 23 篇 lattice reductio...
  • 22 篇 lattice
  • 20 篇 rsa
  • 16 篇 cryptanalysis
  • 13 篇 lattice basis re...
  • 13 篇 mimo
  • 12 篇 coppersmith's me...
  • 11 篇 lattices
  • 7 篇 mmse
  • 7 篇 factorization
  • 6 篇 ntru
  • 6 篇 closest vector p...
  • 6 篇 lattice-reductio...
  • 6 篇 signal estimatio...
  • 6 篇 semi-infinite li...
  • 5 篇 shortest vector ...
  • 5 篇 unravelled linea...
  • 5 篇 explicit auxilia...
  • 5 篇 cryptography

机构

  • 7 篇 univ electrocomm...
  • 7 篇 chinese acad sci...
  • 6 篇 chinese acad sci...
  • 4 篇 univ chinese aca...
  • 3 篇 ewha womans univ...
  • 3 篇 hong kong baptis...
  • 3 篇 southwest univ c...
  • 3 篇 ewha womans univ...
  • 2 篇 indian stat inst...
  • 2 篇 univ saskatchewa...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ london impe...
  • 2 篇 tsinghua univ de...
  • 2 篇 stellenbosch uni...
  • 2 篇 univ chinese aca...
  • 2 篇 aristotle univ t...
  • 2 篇 indian stat inst...
  • 2 篇 univ caen basse ...
  • 2 篇 beijing res inst...
  • 2 篇 univ tokyo

作者

  • 9 篇 fujino tadashi
  • 8 篇 hu lei
  • 8 篇 sarkar santanu
  • 8 篇 xu jun
  • 6 篇 wu qiang
  • 6 篇 peng liqiang
  • 5 篇 huang zhangjie
  • 5 篇 nitaj abderrahma...
  • 5 篇 kunihiro noboru
  • 4 篇 bi jingguo
  • 4 篇 qiao sanzheng
  • 4 篇 luk franklin t.
  • 4 篇 maitra subhamoy
  • 3 篇 ling cong
  • 3 篇 bremner murray r...
  • 3 篇 hou wei
  • 3 篇 takagi tsuyoshi
  • 3 篇 pan yanbin
  • 3 篇 takayasu atsushi
  • 3 篇 lee hyang-sook

语言

  • 123 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"主题词=LLL Algorithm"
134 条 记 录,以下是101-110 订阅
排序:
Low-complexity MIMO data detection using Seysen's lattice reduction algorithm
Low-complexity MIMO data detection using Seysen's lattice re...
收藏 引用
32nd IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Seethaler, Dominik Matz, Gerald Hlawatsch, Franz Vienna Univ Technol Inst Commun & Radio Frequency Engn Gusshaustr 25-389 A-1040 Vienna Austria
Lattice reduction (LR) is a powerful technique for improving the performance of suboptimum MIMO data detection methods. For LR-assisted data detection, the lll algorithm has been considered almost exclusively so far. ... 详细信息
来源: 评论
NTRU-Like Secure and Effective Congruential Public-Key Cryptosystem Using Big Numbers  2
NTRU-Like Secure and Effective Congruential Public-Key Crypt...
收藏 引用
2nd International Conference on New Trends in Computing Sciences (ICTCS)
作者: Ibrahim, Anas Chefranov, Alexander Hamad, Nagham Eastern Mediterranean Univ Dept Comp Engn Famagusta North Cyprus Turkey Palestine Tech Univ Tulkarem Palestine
We propose RCPKC, a random congruential public key cryptosystem working on integers modulo q, such that the norm of a two-dimensional vector formed by its private key, (f;g), is greater than q. RCPKC works similar to ... 详细信息
来源: 评论
A Gram-Schmidt Based Lattice-Reduction Aided MMSE Detection in MIMO Systems
A Gram-Schmidt Based Lattice-Reduction Aided MMSE Detection ...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM 09)
作者: Fujino, Tadashi Wakazono, Shinjiro Sasaki, Yusuke Univ Electrocommun Chofu Tokyo 1828585 Japan
This paper proposes an improved lattice-reduction aided (IRA) MMSE detection based on the Gram-Schmidt (GS) procedure. The proposed detection reduces the column vectors of the MIMO channel matrix using the lll algorit... 详细信息
来源: 评论
Computing the Shortest Vector in a Lattice Using the Alternating Direction Method of Multipliers
Computing the Shortest Vector in a Lattice Using the Alterna...
收藏 引用
Computing Conference
作者: Al Kendi, Wissam Chretien, Stephane Guyeux, Christophe Univ Franche Comte IUT Belfort Lab DISC FEMTO ST Belfort France
Computing the shortest vector in a lattice has many applications in computer science and engineering such as in cryptography, coding theory, and quantum computing. One of the best known algorithms for computing such s... 详细信息
来源: 评论
Partial Key Exposure Attacks on Takagi's Variant of RSA
Partial Key Exposure Attacks on Takagi's Variant of RSA
收藏 引用
12th International Conference on Applied Cryptography and Network Security (ACNS)
作者: Huang, Zhangjie Hu, Lei Xu, Jun Peng, Liqiang Xie, Yonghong Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China
We present several attacks on a variant of RSA due to Takagi when different parts of the private exponent are known to an attacker. We consider three cases when the exposed bits are the most significant bits, the leas... 详细信息
来源: 评论
Cryptanalysis of Multi-Prime Φ-Hiding Assumption  19th
Cryptanalysis of Multi-Prime Φ-Hiding Assumption
收藏 引用
19th Annual International Conference on Information Security (ISC)
作者: Xu, Jun Hu, Lei Sarkar, Santanu Zhang, Xiaona Huang, Zhangjie Peng, Liqiang Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing 100093 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100093 Peoples R China Indian Inst Technol Sardar Patel Rd Madras 600036 Tamil Nadu India
In Crypto 2010, Kiltz, O'Neill and Smith used m-prime RSA modulus N with m >= 3 for constructing lossy RSA. The security of the proposal is based on the Multi-Prime Phi-Hiding Assumption. In this paper, we prop... 详细信息
来源: 评论
Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys  11
Investigating Vulnerabilities in RSA-like Cryptosystems Thro...
收藏 引用
11th IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan) - Empower of Innovative Consumer Technology
作者: Kumagai, Sou Kanzawa, Shota Huda, Samsul Kodera, Yuta Nogami, Yasuyuki Okayama Univ Grad Sch Environm Life Nat Sci & Technol Okayama Japan Japan Res Inst Ltd 2-18-1 HigashigotandaShinagawa Ku Tokyo 1410022 Japan Okayama Univ Green Innovat Ctr Okayama Japan
RSA-like cryptosystems, based on the original RSA algorithm, are gaining attention as potential alternatives to traditional techniques. They offer better security, efficiency, flexibility, and compatibility in cryptog... 详细信息
来源: 评论
A Combined Forward and Backward Lattice-Reduction Aided MMSE List Detection
A Combined Forward and Backward Lattice-Reduction Aided MMSE...
收藏 引用
International Conference on Advanced Technologies for Communications
作者: Fujino, Tadashi Shimokawa, Tetsuyoshi Tran, Xuan Nam Univ Electrocommun Chofu Tokyo 1828585 Japan Le Qui Don Tech Univ Hanoi Vietnam
This paper proposes a combined forward and backward lattice-reduction aided detection scheme to improve estimation of transmitted signals in lattice-reduction aided (LRA) MMSE MIMO systems. The cross-cor relation betw... 详细信息
来源: 评论
Multiplicative dependence between Padovan and Perrin numbers
收藏 引用
BOLETIN DE LA SOCIEDAD MATEMATICA MEXICANA 2023年 第2期29卷 1-12页
作者: Behera, Mitashree Ray, Prasanta Kumar Sambalpur Univ Sambalpur India
Padovan and Perrin sequences are ternary recurrent sequences that satisfy the same relation w(n) = w(n-2 )+ w(n-3) with different initial conditions (w(0), w(1), w(2)) = (1, 1, 1) and (3, 0, 2), respectively. In this ... 详细信息
来源: 评论
Solving Generalized Small Inverse Problems
Solving Generalized Small Inverse Problems
收藏 引用
15th Australasian conference, ACISP 2010
作者: Kunihiro, Noboru Univ Tokyo Tokyo 1138654 Japan
We introduce a "generalized small inverse problem (GSIP)" and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x(0), x(1), . . , x(n)) = x(0)h(x(1), . . . , x... 详细信息
来源: 评论