Search dblp for Publications

export results for "toc:db/series/isc/isc364202294.bht:"

 download as .bib file

@incollection{DBLP:series/isc/AardalE10,
  author       = {Karen I. Aardal and
                  Friedrich Eisenbrand},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The {LLL} Algorithm and Integer Programming},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {293--314},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_9},
  doi          = {10.1007/978-3-642-02295-1\_9},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/AardalE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Gentry10,
  author       = {Craig Gentry},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The Geometry of Provable Security: Some Proofs of Security in Which
                  Lattices Make a Surprise Appearance},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {391--426},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_12},
  doi          = {10.1007/978-3-642-02295-1\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Gentry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Hanrot10,
  author       = {Guillaume Hanrot},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {{LLL:} {A} Tool for Effective Diophantine Approximation},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {215--263},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_6},
  doi          = {10.1007/978-3-642-02295-1\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Hanrot10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/HoffsteinHPW10,
  author       = {Jeffrey Hoffstein and
                  Nick Howgrave{-}Graham and
                  Jill Pipher and
                  William Whyte},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {349--390},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_11},
  doi          = {10.1007/978-3-642-02295-1\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/HoffsteinHPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Khot10,
  author       = {Subhash Khot},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Inapproximability Results for Computational Problems on Lattices},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {453--473},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_14},
  doi          = {10.1007/978-3-642-02295-1\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Khot10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Kluners10,
  author       = {J{\"{u}}rgen Kl{\"{u}}ners},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The van Hoeij Algorithm for Factoring Polynomials},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {283--291},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_8},
  doi          = {10.1007/978-3-642-02295-1\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Kluners10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/May10,
  author       = {Alexander May},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Using LLL-Reduction for Solving {RSA} and Factorization Problems},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {315--348},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_10},
  doi          = {10.1007/978-3-642-02295-1\_10},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/May10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Micciancio10,
  author       = {Daniele Micciancio},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Cryptographic Functions from Worst-Case Complexity Assumptions},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {427--452},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_13},
  doi          = {10.1007/978-3-642-02295-1\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isc/Micciancio10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Nguyen10,
  author       = {Phong Q. Nguyen},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Hermite's Constant and Lattice Algorithms},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {19--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_2},
  doi          = {10.1007/978-3-642-02295-1\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Nguyen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Regev10,
  author       = {Oded Regev},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {On the Complexity of Lattice Problems with Polynomial Approximation
                  Factors},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {475--496},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_15},
  doi          = {10.1007/978-3-642-02295-1\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Regev10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Schnorr10,
  author       = {Claus{-}Peter Schnorr},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Progress on {LLL} and Lattice Reduction},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {145--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_4},
  doi          = {10.1007/978-3-642-02295-1\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Schnorr10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Simon10,
  author       = {Denis Simon},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Selected Applications of {LLL} in Number Theory},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {265--282},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_7},
  doi          = {10.1007/978-3-642-02295-1\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Simon10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/SmeetsLLLB10,
  author       = {Ionica Smeets and
                  Arjen K. Lenstra and
                  Hendrik Lenstra and
                  L{\'{a}}szl{\'{o}} Lov{\'{a}}sz and
                  Peter van Emde Boas},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The History of the LLL-Algorithm},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_1},
  doi          = {10.1007/978-3-642-02295-1\_1},
  timestamp    = {Tue, 06 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/SmeetsLLLB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Stehle10,
  author       = {Damien Stehl{\'{e}}},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Floating-Point {LLL:} Theoretical and Practical Aspects},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {179--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_5},
  doi          = {10.1007/978-3-642-02295-1\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/Stehle10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/ValleeV10,
  author       = {Brigitte Vall{\'{e}}e and
                  Antonio Vera},
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {Probabilistic Analyses of Lattice Reduction Algorithms},
  booktitle    = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  pages        = {71--143},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1\_3},
  doi          = {10.1007/978-3-642-02295-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/ValleeV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/364202294,
  editor       = {Phong Q. Nguyen and
                  Brigitte Vall{\'{e}}e},
  title        = {The {LLL} Algorithm - Survey and Applications},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-02295-1},
  doi          = {10.1007/978-3-642-02295-1},
  isbn         = {978-3-642-02294-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/364202294.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics