咨询与建议

限定检索结果

文献类型

  • 5 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 电气工程
  • 3 篇 理学
    • 3 篇 数学

主题

  • 8 篇 lattice reductio...
  • 3 篇 lattice
  • 2 篇 orthogonal latti...
  • 1 篇 channel quality ...
  • 1 篇 signal detection
  • 1 篇 security evaluat...
  • 1 篇 lr-aided ld
  • 1 篇 shortest vector ...
  • 1 篇 mimo communicati...
  • 1 篇 antenna radiatio...
  • 1 篇 signal processin...
  • 1 篇 isis
  • 1 篇 wireless channel...
  • 1 篇 signal-to-interf...
  • 1 篇 transmit-receive...
  • 1 篇 dynamic adaptivi...
  • 1 篇 approximate comm...
  • 1 篇 self-dual bkz
  • 1 篇 darmstadt’s latt...
  • 1 篇 wireless sensor ...

机构

  • 1 篇 chinese acad sci...
  • 1 篇 nanjing univ pos...
  • 1 篇 fujian normal un...
  • 1 篇 guangzhou univ s...
  • 1 篇 staffordshire un...
  • 1 篇 univ campus suff...
  • 1 篇 indian inst tech...
  • 1 篇 univ tokyo grad ...
  • 1 篇 academy of milit...
  • 1 篇 beijing univ tec...
  • 1 篇 state key lab cr...
  • 1 篇 xidian univ stat...
  • 1 篇 xuchang univ sch...
  • 1 篇 college of infor...
  • 1 篇 guangzhou univ g...
  • 1 篇 college of scien...
  • 1 篇 fujian normal un...
  • 1 篇 xidian univ cryp...

作者

  • 1 篇 hu lei
  • 1 篇 zhao yong
  • 1 篇 liu chen
  • 1 篇 yang shaojun
  • 1 篇 wang leizhang
  • 1 篇 wu wei
  • 1 篇 chen hao
  • 1 篇 jia huiwen
  • 1 篇 yang wei
  • 1 篇 abdel-maguid moh...
  • 1 篇 sarkar santanu
  • 1 篇 xu jun
  • 1 篇 lu feng
  • 1 篇 song yunchao
  • 1 篇 chen yange
  • 1 篇 qu longjiang
  • 1 篇 harase shin
  • 1 篇 li tuoyan
  • 1 篇 sun minghao
  • 1 篇 wang shixiong

语言

  • 8 篇 英文
检索条件"主题词=lattice reduction algorithm"
8 条 记 录,以下是1-10 订阅
排序:
An efficient lattice reduction method for F2-linear pseudorandom number generators using Mulders and Storjohann algorithm
收藏 引用
JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS 2011年 第2期236卷 141-149页
作者: Harase, Shin Univ Tokyo Grad Sch Math Sci Meguro Ku Tokyo 1538914 Japan
Recent simulations often use highly parallel machines with many processors, and they need many pseudorandom number generators with distinct parameter sets, and hence we need an effective fast assessment of the generat... 详细信息
来源: 评论
lattice reduction-ordered successive interference cancellation detection algorithm for multiple-input-multiple-output system
收藏 引用
IET SIGNAL PROCESSING 2015年 第7期9卷 553-561页
作者: Song, Yunchao Liu, Chen Lu, Feng Nanjing Univ Posts & Telecommun Sch Elect Sci & Engn Nanjing 210003 Jiangsu Peoples R China
lattice reduction (LR) is a powerful technique for improving the performance of linear multiple-input-multiple-output detection methods. The efficient LR algorithms can largely improve the performance of the linear de... 详细信息
来源: 评论
A New Random Sampling Method and Its Application in Improving Progressive BKZ algorithm
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 2262-2292页
作者: SUN Minghao WANG Shixiong CHEN Hao QU Longjiang College of Sciences National University of Defense TechnologyChangsha 410073China Academy of Military Sciences Beijing 100091China College of Information Science and Technology/Cyber Security Jinan UniversityGuangzhou 510632China
Random sampling algorithm was proposed firstly by Schnorr in 2003 to find short lattice vectors,as an alternative to *** follow-up developments in random sampling were mainly proposed by Fukase and Kashiwabara in 2015... 详细信息
来源: 评论
Cooperative transmission schemes for energy-efficient collaborative wireless sensor networks
收藏 引用
IET SCIENCE MEASUREMENT & TECHNOLOGY 2014年 第6期8卷 391-398页
作者: Naeem, Muhammad Kamran Patwary, Mohammad Nuruzzaman Soliman, Abdel-Hamid Abdel-Maguid, Mohamed Staffordshire Univ FCES Stafford ST18 0AD Staffs England Univ Campus Suffolk Sch Sci Technol & Hlth Ipswich IP4 1QJ Suffolk England
Energy conservation is one of the prime concerns that leads the researcher to investigate collaborative wireless sensor networks with some application specific challenges. Such challenges include combining distributed... 详细信息
来源: 评论
Revisiting orthogonal lattice attacks on approximate common divisor problems
收藏 引用
THEORETICAL COMPUTER SCIENCE 2022年 911卷 55-69页
作者: Xu, Jun Sarkar, Santanu Hu, Lei Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing 100093 Peoples R China Indian Inst Technol Madras Dept Math Sardar Patel Rd Chennai 600036 Tamil Nadu India
In this paper, we revisit three existing types of orthogonal lattice (OL) attacks and propose optimized cases to solve approximate common divisor (ACD) problems. In order to reduce both space and time costs, we also m... 详细信息
来源: 评论
A New Self-dual BKZ algorithm Based on lattice Sieving  6th
A New Self-dual BKZ Algorithm Based on Lattice Sieving
收藏 引用
6th International Conference on Frontiers in Cyber Security (FCS)
作者: Deng, Xixuan Jia, Huiwen Guangzhou Univ Sch Math & Informat Sci Key Lab Informat Secur Guangzhou Peoples R China Guangzhou Univ Guangzhou Ctr Appl Math Guangzhou Peoples R China
lattice reduction algorithm is an important algorithm for solving lattice Shortest Vector Problem (SVP), which makes it the primary tool for evaluating the security of lattice-based cryptographic schemes. lattice redu... 详细信息
来源: 评论
Implementing Attacks on the Approximate Greatest Common Divisor Problem  2nd
Implementing Attacks on the Approximate Greatest Common Divi...
收藏 引用
2nd International Conference on Frontiers in Cyber Security (FCS)
作者: Wang, Leizhang Qu, Quanbo Li, Tuoyan Chen, Yange Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Xidian Univ Cryptog Res Ctr Xian 710071 Peoples R China Beijing Univ Technol Coll Appl Sci Beijing 100124 Peoples R China Xuchang Univ Sch Informat Engn Xuchang 461000 Peoples R China
The security of many fully homomorphic encryption (FHE) schemes is guaranteed by the difficulty of the approximate greatest common divisor (AGCD) problem. Therefore, the study of AGCD problem is of great significance ... 详细信息
来源: 评论
A Combination reduction algorithm and Its Application  16th
A Combination Reduction Algorithm and Its Application
收藏 引用
16th International Conference on Network and System Security (NSS)
作者: Yang, Wei Yang, Shaojun Wu, Wei Zhao, Yong Fujian Normal Univ Sch Math & Stat Fuzhou 350117 Peoples R China State Key Lab Cryptol Beijing 100878 Peoples R China Fujian Normal Univ Coll Comp & Cyber Secur Fuzhou 350117 Peoples R China
After the Snowden incident, cryptographic subversion attack has attracted widespread attentions. Subversion attack is an unconventional attack inside machines, which has strong concealment. It will threaten the securi... 详细信息
来源: 评论