咨询与建议

限定检索结果

文献类型

  • 84 篇 期刊文献
  • 48 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 66 篇 计算机科学与技术...
    • 49 篇 电气工程
    • 20 篇 信息与通信工程
    • 16 篇 电子科学与技术(可...
    • 7 篇 软件工程
    • 3 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 60 篇 理学
    • 53 篇 数学
    • 4 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 6 篇 医学
    • 6 篇 临床医学
    • 1 篇 特种医学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 哲学
    • 1 篇 哲学

主题

  • 134 篇 lll algorithm
  • 23 篇 lattice reductio...
  • 22 篇 lattice
  • 20 篇 rsa
  • 16 篇 cryptanalysis
  • 13 篇 lattice basis re...
  • 13 篇 mimo
  • 12 篇 coppersmith's me...
  • 11 篇 lattices
  • 7 篇 mmse
  • 7 篇 factorization
  • 6 篇 ntru
  • 6 篇 closest vector p...
  • 6 篇 lattice-reductio...
  • 6 篇 signal estimatio...
  • 6 篇 semi-infinite li...
  • 5 篇 shortest vector ...
  • 5 篇 unravelled linea...
  • 5 篇 explicit auxilia...
  • 5 篇 cryptography

机构

  • 7 篇 univ electrocomm...
  • 7 篇 chinese acad sci...
  • 6 篇 chinese acad sci...
  • 4 篇 univ chinese aca...
  • 3 篇 ewha womans univ...
  • 3 篇 hong kong baptis...
  • 3 篇 southwest univ c...
  • 3 篇 ewha womans univ...
  • 2 篇 indian stat inst...
  • 2 篇 univ saskatchewa...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ london impe...
  • 2 篇 tsinghua univ de...
  • 2 篇 stellenbosch uni...
  • 2 篇 univ chinese aca...
  • 2 篇 aristotle univ t...
  • 2 篇 indian stat inst...
  • 2 篇 univ caen basse ...
  • 2 篇 beijing res inst...
  • 2 篇 univ tokyo

作者

  • 9 篇 fujino tadashi
  • 8 篇 hu lei
  • 8 篇 sarkar santanu
  • 8 篇 xu jun
  • 6 篇 wu qiang
  • 6 篇 peng liqiang
  • 5 篇 huang zhangjie
  • 5 篇 nitaj abderrahma...
  • 5 篇 kunihiro noboru
  • 4 篇 bi jingguo
  • 4 篇 qiao sanzheng
  • 4 篇 luk franklin t.
  • 4 篇 maitra subhamoy
  • 3 篇 ling cong
  • 3 篇 bremner murray r...
  • 3 篇 hou wei
  • 3 篇 takagi tsuyoshi
  • 3 篇 pan yanbin
  • 3 篇 takayasu atsushi
  • 3 篇 lee hyang-sook

语言

  • 123 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"主题词=LLL Algorithm"
134 条 记 录,以下是61-70 订阅
排序:
An efficient algorithm for clustered integer least squares problems
收藏 引用
NUMERICAL LINEAR ALGEBRA WITH APPLICATIONS 2012年 第1期19卷 19-30页
作者: Chun, Joohwan Park, Jaehyun Korea Adv Inst Sci & Technol Dept Elect Engn Taejon 305701 South Korea
The integer least squares problem is known to be NP-hard, and the algorithms such as the sphere decoding algorithm, which give the optimal solution, are usually too slow. To obtain a solution efficiently one may use o... 详细信息
来源: 评论
On the security of the improved knapsack cryptosystem
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 1998年 第10期E81A卷 2184-2185页
作者: Kuwakado, H Tanaka, H Kobe Univ Fac Engn Kobe Hyogo 6578501 Japan
We discuss the security of the improved knapsack cryptosystem that Kobayashi and Kimura have proposed. Two attacking methods for their cryptosystem are proposed;one is the method for obtaining secret keys from public ... 详细信息
来源: 评论
On Deterministic Polynomial-time Equivalence of Computing the CRT-RSA Secret Keys and Factoring
收藏 引用
DEFENCE SCIENCE JOURNAL 2012年 第2期62卷 122-126页
作者: Maitra, Subhamoy Sarkar, Santanu Indian Stat Inst Kolkata 700108 India
Let N = pq be the product of two large primes. Consider Chinese remainder theorem-Rivest, Shamir, Adleman (CRT-RSA) with the public encryption exponent e and private decryption exponents d(p), d(q). It is well known t... 详细信息
来源: 评论
An Improved Attack on the Basic Merkle-Hellman Knapsack Cryptosystem
收藏 引用
IEEE ACCESS 2019年 7卷 59388-59393页
作者: Liu, Jiayang Bi, Jingguo Xu, Songyan Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China Beijing Res Inst Telemetry Beijing 100094 Peoples R China Tsinghua Univ Inst Adv Study Beijing 100084 Peoples R China
Knapsack problem is a famous NP-complete problem, which is believed to be difficult to be solved even by a quantum computer. Hence, this type of cryptosystem is a good candidate for post-quantum cryptography. Recently... 详细信息
来源: 评论
Cryptanalysis of RSA with more than one decryption exponent
收藏 引用
INFORMATION PROCESSING LETTERS 2010年 第8-9期110卷 336-340页
作者: Sarkar, Santanu Maitra, Subhamoy Indian Stat Inst Appl Stat Unit Kolkata 700108 India
In this paper, we analyze the security of the RSA public key cryptosystem where multiple encryption and decryption exponents are considered with the same RSA modulus N. We consider N = pq, where p, q are of the same b... 详细信息
来源: 评论
On the irrationality measure of log 3
收藏 引用
JOURNAL OF NUMBER THEORY 2014年 142卷 264-273页
作者: Wu, Qiang Wang, Lihong Southwest Univ China Dept Math Chongqing 400715 Peoples R China
In this paper, we obtain a new estimate of an irrationality measure of the number log 3. We have mu(log 3) <= 5.1163051 with an "arithmetical method". The previous results were mu(log 3) <= 8.616... by... 详细信息
来源: 评论
One-parameter deformations of the diassociative and dendriform operads
收藏 引用
LINEAR & MULTILINEAR ALGEBRA 2017年 第2期65卷 341-350页
作者: Bremner, Murray R. Univ Saskatchewan Dept Math & Stat Saskatoon SK Canada
Livernet and Loday constructed a polarization of the nonsymmetric associative operad A with one operation into a symmetric operad SA with two operations (the Lie bracket and Jordan product), and defined a one-paramete... 详细信息
来源: 评论
The measure of totally positive algebraic integers
收藏 引用
JOURNAL OF NUMBER THEORY 2013年 第1期133卷 12-19页
作者: Mu, Quanwu Wu, Qiang SW Univ China Dept Math Chongqing 400715 Peoples R China
For a totally positive algebraic integer alpha not equal 0, 1 of degree d, we consider the set R of values of L(alpha)(1/d) = R(alpha) and the set L of values of M(alpha)(1/d) = Omega(alpha). where L(alpha) is the len... 详细信息
来源: 评论
A Unified Method for Private Exponent Attacks on RSA Using Lattices
收藏 引用
INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE 2020年 第2期31卷 207-231页
作者: Bahig, Hatem M. Nassr, Dieaa, I Bhery, Ashraf Nitaj, Abderrahmane Ain Shams Univ Fac Sci Dept Math Comp Sci Div Cairo 11566 Egypt Univ Caen Lab Math Nicolas Oresme Basse Normandie France
Let (n = pq, e = n(beta)) be an RSA public key with private exponent d = n(delta), where p and q are large primes of the same bit size. At Eurocrypt 96, Coppersmith presented a polynomial-time algorithm for finding sm... 详细信息
来源: 评论
Efficient lattice assessment for LCG and GLP parameter searches
收藏 引用
MATHEMATICS OF COMPUTATION 2002年 第239期71卷 1231-1242页
作者: Entacher, K Schell, T Uhl, A Univ Appl Sci & Technol Sch Telecommun Engn A-5020 Salzburg Austria Salzburg Univ Dept Comp Sci A-5020 Salzburg Austria
In the present paper we show how to speed up lattice parameter searches for Monte Carlo and quasi-Monte Carlo node sets. The classical measure for such parameter searches is the spectral test which is based on a calcu... 详细信息
来源: 评论