Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/series/isc/isc364202294.bht:"
@incollection{DBLP:series/isc/AardalE10, author = {Karen I. Aardal and Friedrich Eisenbrand}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The {LLL} Algorithm and Integer Programming}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {293--314}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_9}, doi = {10.1007/978-3-642-02295-1\_9}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/AardalE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Gentry10, author = {Craig Gentry}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {391--426}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_12}, doi = {10.1007/978-3-642-02295-1\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Gentry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Hanrot10, author = {Guillaume Hanrot}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {{LLL:} {A} Tool for Effective Diophantine Approximation}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {215--263}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_6}, doi = {10.1007/978-3-642-02295-1\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Hanrot10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/HoffsteinHPW10, author = {Jeffrey Hoffstein and Nick Howgrave{-}Graham and Jill Pipher and William Whyte}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {349--390}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_11}, doi = {10.1007/978-3-642-02295-1\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/HoffsteinHPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Khot10, author = {Subhash Khot}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Inapproximability Results for Computational Problems on Lattices}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {453--473}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_14}, doi = {10.1007/978-3-642-02295-1\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Khot10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Kluners10, author = {J{\"{u}}rgen Kl{\"{u}}ners}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The van Hoeij Algorithm for Factoring Polynomials}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {283--291}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_8}, doi = {10.1007/978-3-642-02295-1\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Kluners10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/May10, author = {Alexander May}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Using LLL-Reduction for Solving {RSA} and Factorization Problems}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {315--348}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_10}, doi = {10.1007/978-3-642-02295-1\_10}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/May10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Micciancio10, author = {Daniele Micciancio}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Cryptographic Functions from Worst-Case Complexity Assumptions}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {427--452}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_13}, doi = {10.1007/978-3-642-02295-1\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isc/Micciancio10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Nguyen10, author = {Phong Q. Nguyen}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Hermite's Constant and Lattice Algorithms}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {19--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_2}, doi = {10.1007/978-3-642-02295-1\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Nguyen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Regev10, author = {Oded Regev}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {On the Complexity of Lattice Problems with Polynomial Approximation Factors}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {475--496}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_15}, doi = {10.1007/978-3-642-02295-1\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Regev10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Schnorr10, author = {Claus{-}Peter Schnorr}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Progress on {LLL} and Lattice Reduction}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {145--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_4}, doi = {10.1007/978-3-642-02295-1\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Schnorr10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Simon10, author = {Denis Simon}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Selected Applications of {LLL} in Number Theory}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {265--282}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_7}, doi = {10.1007/978-3-642-02295-1\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Simon10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/SmeetsLLLB10, author = {Ionica Smeets and Arjen K. Lenstra and Hendrik Lenstra and L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and Peter van Emde Boas}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The History of the LLL-Algorithm}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {1--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_1}, doi = {10.1007/978-3-642-02295-1\_1}, timestamp = {Tue, 06 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/SmeetsLLLB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Stehle10, author = {Damien Stehl{\'{e}}}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Floating-Point {LLL:} Theoretical and Practical Aspects}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {179--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_5}, doi = {10.1007/978-3-642-02295-1\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/Stehle10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/ValleeV10, author = {Brigitte Vall{\'{e}}e and Antonio Vera}, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {Probabilistic Analyses of Lattice Reduction Algorithms}, booktitle = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, pages = {71--143}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1\_3}, doi = {10.1007/978-3-642-02295-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/ValleeV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/364202294, editor = {Phong Q. Nguyen and Brigitte Vall{\'{e}}e}, title = {The {LLL} Algorithm - Survey and Applications}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-02295-1}, doi = {10.1007/978-3-642-02295-1}, isbn = {978-3-642-02294-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/364202294.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.