1 |
M. Ajtai, Generating hard instances of lattice problems, In Proceedings of 28th STOC, Philadelphia, 1996. pp. 99-108
|
2 |
P. Van Emde Boas. Another NP-complete problem and the complexity of computing short vectors in a lattice Report 81-04, Mathematische Institut University of Amsterdam, 1981
|
3 |
M. Ajtai, and C. Dwork, A public-key cryptosystem with worst-case/average-case equivalence, In Proceedings of 29th STOC. Texas, 1997, pp. 284-293
|
4 |
P. Nguyen, Cryptanalysis of the Gold reich-Goldwasser-Halevi Cryptosystem from Crypto '97, In Proceedings of CRYPT0'99, Santa Barbara, CA, 1999, pp. 112-131
|
5 |
L. Babai, On Lovasz lattice reduction and the nearest lattice point problem. Combinatorica. Vol.6, No.1, 1986, pp. 113
|
6 |
O. Goldreich, S. Goldwasser, and S. Halvei, , In Proceedings of CRYPT0'97, Santa Barbara CA, 1997, pp. 112-131Public-key cryptosystems from lattice reduction problems
|
7 |
A. K. Lenstra, H. W. Lenstra, L. Lovasz, Factoring polynomials with rational coefficients. Mathematische Annalen 261, 1982, pp. 515-534
|
8 |
LiDIA, A C++ Library For Computational Number Theory, Available from http://www.informatik.th-darmstadt.de/TI/LiDIA/Welcome.html
|