咨询与建议

限定检索结果

文献类型

  • 84 篇 期刊文献
  • 48 篇 会议
  • 1 册 图书
  • 1 篇 学位论文

馆藏范围

  • 134 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 66 篇 计算机科学与技术...
    • 49 篇 电气工程
    • 20 篇 信息与通信工程
    • 16 篇 电子科学与技术(可...
    • 7 篇 软件工程
    • 3 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 60 篇 理学
    • 53 篇 数学
    • 4 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 6 篇 医学
    • 6 篇 临床医学
    • 1 篇 特种医学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 哲学
    • 1 篇 哲学

主题

  • 134 篇 lll algorithm
  • 23 篇 lattice reductio...
  • 22 篇 lattice
  • 20 篇 rsa
  • 16 篇 cryptanalysis
  • 13 篇 lattice basis re...
  • 13 篇 mimo
  • 12 篇 coppersmith's me...
  • 11 篇 lattices
  • 7 篇 mmse
  • 7 篇 factorization
  • 6 篇 ntru
  • 6 篇 closest vector p...
  • 6 篇 lattice-reductio...
  • 6 篇 signal estimatio...
  • 6 篇 semi-infinite li...
  • 5 篇 shortest vector ...
  • 5 篇 unravelled linea...
  • 5 篇 explicit auxilia...
  • 5 篇 cryptography

机构

  • 7 篇 univ electrocomm...
  • 7 篇 chinese acad sci...
  • 6 篇 chinese acad sci...
  • 4 篇 univ chinese aca...
  • 3 篇 ewha womans univ...
  • 3 篇 hong kong baptis...
  • 3 篇 southwest univ c...
  • 3 篇 ewha womans univ...
  • 2 篇 indian stat inst...
  • 2 篇 univ saskatchewa...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ london impe...
  • 2 篇 tsinghua univ de...
  • 2 篇 stellenbosch uni...
  • 2 篇 univ chinese aca...
  • 2 篇 aristotle univ t...
  • 2 篇 indian stat inst...
  • 2 篇 univ caen basse ...
  • 2 篇 beijing res inst...
  • 2 篇 univ tokyo

作者

  • 9 篇 fujino tadashi
  • 8 篇 hu lei
  • 8 篇 sarkar santanu
  • 8 篇 xu jun
  • 6 篇 wu qiang
  • 6 篇 peng liqiang
  • 5 篇 huang zhangjie
  • 5 篇 nitaj abderrahma...
  • 5 篇 kunihiro noboru
  • 4 篇 bi jingguo
  • 4 篇 qiao sanzheng
  • 4 篇 luk franklin t.
  • 4 篇 maitra subhamoy
  • 3 篇 ling cong
  • 3 篇 bremner murray r...
  • 3 篇 hou wei
  • 3 篇 takagi tsuyoshi
  • 3 篇 pan yanbin
  • 3 篇 takayasu atsushi
  • 3 篇 lee hyang-sook

语言

  • 123 篇 英文
  • 10 篇 其他
  • 1 篇 中文
检索条件"主题词=LLL algorithm"
134 条 记 录,以下是61-70 订阅
排序:
Simultaneous Approximation Problems of p-Adic Numbers and p-Adic Knapsack Cryptosystems - Alice in p-Adic Numberland
收藏 引用
P-ADIC NUMBERS ULTRAMETRIC ANALYSIS AND APPLICATIONS 2016年 第4期8卷 312-324页
作者: Inoue, H. Kamada, Sh. Naito, K. Kumamoto Univ Dept Appl Math Grad Sch Sci & Technol Kurokami 2-39-1 Kumamoto Japan
In this paper we construct the multi-dimensional p-adic approximation lattices by using simultaneous approximation problems (SAP) of p-adic numbers and we estimate the l(infinity) norm of the p-adic SAP solutions theo... 详细信息
来源: 评论
Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013  1
收藏 引用
12th International Conference on Information Security Practice and Experience (ISPEC)
作者: Bi, Jingguo Liu, Jiayang Tsinghua Univ Inst Adv Study Beijing 100084 Peoples R China State Key Lab Cryptol Beijing 100878 Peoples R China Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China
At TrustCom 2013, Govinda Ramaiah and Vijaya Kumari proposed a new protocol for verifying the integrity of the data stored at the remote cloud server, based on a practical version of homomorphic encryption based on in... 详细信息
来源: 评论
Recovering a Sum of Two Squares Decomposition Revisited  11th
Recovering a Sum of Two Squares Decomposition Revisited
收藏 引用
11th China International Conference on Information Security and Cryptology (Inscrypt)
作者: Zhang, Xiaona Wang, Li-Ping Xu, Jun Hu, Lei Peng, Liqiang Huang, Zhangjie Liu, Zeyi Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing 100093 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100093 Peoples R China Univ Chinese Acad Sci Beijing Peoples R China
Recently, in [6] Gomez et al. presented algorithms to recover a decomposition of an integer N = rA(2) + sB(2), where N, r, s are positive integers, and A, B are the wanted unknowns. Their first algorithm recovers two ... 详细信息
来源: 评论
A pivoted lll algorithm
A pivoted LLL algorithm
收藏 引用
2nd International Conference on Numerical Algebra and Scientific Computing (NASC)
作者: Luk, Franklin T. Qiao, Sanzheng Hong Kong Baptist Univ Dept Math Kowloon Tong Hong Kong Peoples R China
Luk and Tracy (2008) [7] developed a matrix interpretation of the lll algorithm. Building on their work [7], we propose to add pivoting to the algorithm. We prove that our new algorithm always terminates, and we const... 详细信息
来源: 评论
A Parallel lll algorithm
A Parallel LLL Algorithm
收藏 引用
4th International C* Conference on Computer Science and Software Engineering (C3S2E)
作者: Luo, Yixian Qiao, Sanzheng McMaster Univ Dept Comp & Software 1280 Main St West Hamilton ON L8S 4K1 Canada
The lll algorithm is a well-known and widely used lattice basis reduction algorithm. hi many applications, its speed is critical. Parallel computing can improve speed. However, the original lll is sequential in nature... 详细信息
来源: 评论
Cryptanalysis of Multi-Prime Φ-Hiding Assumption  19th
Cryptanalysis of Multi-Prime Φ-Hiding Assumption
收藏 引用
19th Annual International Conference on Information Security (ISC)
作者: Xu, Jun Hu, Lei Sarkar, Santanu Zhang, Xiaona Huang, Zhangjie Peng, Liqiang Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing 100093 Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing 100093 Peoples R China Indian Inst Technol Sardar Patel Rd Madras 600036 Tamil Nadu India
In Crypto 2010, Kiltz, O'Neill and Smith used m-prime RSA modulus N with m >= 3 for constructing lossy RSA. The security of the proposal is based on the Multi-Prime Phi-Hiding Assumption. In this paper, we prop... 详细信息
来源: 评论
A Low Complexity ZF-Based Lattice Reduction Detection Using Curtailment Parameter in MIMO Systems  15
A Low Complexity ZF-Based Lattice Reduction Detection Using ...
收藏 引用
15th IEEE/ACIS International Conference on Computer and Information Science (ICIS)
作者: Mitsunaga, Daisuke Khine, Thae Thae Yu Zhao, Hua-An Kumamoto Univ Dept Comp Sci & Elect Engn Kumamoto 860 Japan
As the large-scale multiple-input multiple-output (MIMO) systems have been advanced in wireless communication, the low complexity and high performance receiver technique have been required. Recently, lattice reduction... 详细信息
来源: 评论
Mit :: Ai :: Aim :: Aitr-1283
收藏 引用
2016年
Mit :: Ai :: Aim :: Aitr-1283 by published by
来源: 评论
Cryptanalysis of Prime Power RSA with two private exponents
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 59-66页
作者: ZHENG MengCe HU HongGang Key Laboratory of Electromagnetic Space Information Chinese Academy of Sciences School of Information Science and Technology University of Science and Technology of China
In this paper, we consider a variant of RSA schemes called Prime Power RSA with modulus N= prq for r 2, where p, q are of the same bit-size. May showed that when private exponent d<N;/(r+1);or d < N;, N can be... 详细信息
来源: 评论
A New Attack on RSA with Known Middle Bits of the Private Key
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2015年 第12期E98A卷 2677-2685页
作者: Wang, Shixiong Qu, Longjiang Li, Chao Fu, Shaojing Natl Univ Def Technol Coll Sci Changsha Hunan Peoples R China Natl Univ Def Technol Coll Comp Sci Changsha Hunan Peoples R China
In this paper, we investigate the security property of RSA when some middle bits of the private key d are known to an attacker. Using the technique of unravelled linearization, we present a new attack on RSA with know... 详细信息
来源: 评论