skip to main content
Skip header Section
Complexity of Lattice ProblemsMarch 2002
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISBN:978-0-7923-7688-0
Published:01 March 2002
Pages:
220
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Hasabelnaby M and Chaaban A (2022). Multi-Pair Computation for Two-Way Intra Cloud Radio-Access Network Communications, IEEE Transactions on Wireless Communications, 21:7, (5586-5599), Online publication date: 1-Jul-2022.
  2. ACM
    Bhattacharyya A, Bonnet É, Egri L, Ghoshal S, S. K, Lin B, Manurangsi P and Marx D (2021). Parameterized Intractability of Even Set and Shortest Vector Problem, Journal of the ACM, 68:3, (1-40), Online publication date: 30-Jun-2021.
  3. ACM
    Li J On the Smallest Ratio Problem of Lattice Bases Proceedings of the 2021 on International Symposium on Symbolic and Algebraic Computation, (289-296)
  4. Frank T, Haik O, Jumabayeva A, Allebach J and Yitzhaky Y (2020). New Design for Compact Color Screen Sets for High-End Digital Color Press, IEEE Transactions on Image Processing, 29, (3023-3038), Online publication date: 1-Jan-2020.
  5. Gao W, Chen L, Hu Y, Newton C, Wang B and Chen J (2019). Lattice-based deniable ring signatures, International Journal of Information Security, 18:3, (355-370), Online publication date: 1-Jun-2019.
  6. ACM
    Li J and Nguyen P Computing a Lattice Basis Revisited Proceedings of the 2019 on International Symposium on Symbolic and Algebraic Computation, (275-282)
  7. Wang H, Feng Y, Ding Y and Tang S (2019). A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 23:5, (1735-1744), Online publication date: 1-Mar-2019.
  8. Herold G, Kirshanova E and May A (2018). On the asymptotic complexity of solving LWE, Designs, Codes and Cryptography, 86:1, (55-83), Online publication date: 1-Jan-2018.
  9. Silva D, Pivaro G, Fraidenraich G and Aazhang B (2017). On Integer-Forcing Precoding for the Gaussian MIMO Broadcast Channel, IEEE Transactions on Wireless Communications, 16:7, (4476-4488), Online publication date: 1-Jul-2017.
  10. Dean T and Goldsmith A (2017). Physical-Layer Cryptography Through Massive MIMO, IEEE Transactions on Information Theory, 63:8, (5419-5436), Online publication date: 1-Aug-2017.
  11. Pilaram H and Eghlidos T (2017). An Efficient Lattice Based Multi-Stage Secret Sharing Scheme, IEEE Transactions on Dependable and Secure Computing, 14:1, (2-8), Online publication date: 1-Jan-2017.
  12. Modaresi S, Kılınç M and Vielma J (2016). Intersection cuts for nonlinear integer programming, Mathematical Programming: Series A and B, 155:1-2, (575-611), Online publication date: 1-Jan-2016.
  13. ACM
    Ouaknine J, Pouly A, Sousa-Pinto J and Worrell J Solvability of Matrix-Exponential Equations Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, (798-806)
  14. Wen J, Zhou B, Mow W and Chang X (2016). An Efficient Algorithm for Optimally Solving a Shortest Vector Problem in Compute-and-Forward Design, IEEE Transactions on Wireless Communications, 15:10, (6541-6555), Online publication date: 1-Oct-2016.
  15. Hadian Dehkordi M and Ghasemi R (2016). A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution, Wireless Personal Communications: An International Journal, 91:3, (1459-1469), Online publication date: 1-Dec-2016.
  16. Goldwasser S and Tauman Kalai Y Cryptographic Assumptions Proceedings, Part I, of the 13th International Conference on Theory of Cryptography - Volume 9562, (505-522)
  17. Jarvis K and Nevins M (2015). ETRU, Designs, Codes and Cryptography, 74:1, (219-242), Online publication date: 1-Jan-2015.
  18. Kim K and Jeong I (2015). A new certificateless signature scheme under enhanced security models, Security and Communication Networks, 8:5, (801-810), Online publication date: 25-Mar-2015.
  19. Yan J, Wang L, Dong M, Yang Y and Yao W (2015). Identity-based signcryption from lattices, Security and Communication Networks, 8:18, (3751-3770), Online publication date: 1-Dec-2015.
  20. Wang M An Improved Analysis of Broadcast Attacks on the GGH Cryptosystem Revised Selected Papers of the 16th International Workshop on Information Security Applications - Volume 9503, (146-158)
  21. Crépeau C and Kazmi R Zero-Knowledge Interactive Proof Systems for New Lattice Problems Proceedings of the 15th IMA International Conference on Cryptography and Coding - Volume 9496, (152-169)
  22. Józsa C, Kolumbán G, Vidal A, Martínez-Zaldívar F and González A (2015). Parallel sphere detector algorithm providing optimal MIMO detection on massively parallel architectures, Concurrency and Computation: Practice & Experience, 27:17, (4993-5018), Online publication date: 10-Dec-2015.
  23. ACM
    Ding D, Zhu G and Wang X A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, (823-830)
  24. Plantard T, Susilo W and Zhang Z (2015). LLL for ideal lattices, Designs, Codes and Cryptography, 76:2, (325-344), Online publication date: 1-Aug-2015.
  25. Wang Q and Chen S (2015). Attribute-based signature for threshold predicates from lattices, Security and Communication Networks, 8:5, (811-821), Online publication date: 25-Mar-2015.
  26. Fontein F, Schneider M and Wagner U (2014). PotLLL, Designs, Codes and Cryptography, 73:2, (355-368), Online publication date: 1-Nov-2014.
  27. Albrecht M, Faugére J, Fitzpatrick R, Perret L, Todo Y and Xagawa K Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions Proceedings of the 17th International Conference on Public-Key Cryptography --- PKC 2014 - Volume 8383, (446-464)
  28. Ding D and Zhu G A Simulated Annealing Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors Revised Selected Papers of the 6th International Conference on Trusted Systems - Volume 9473, (51-69)
  29. Fukshansky L and Sun X (2014). On the Geometry of Cyclic Lattices, Discrete & Computational Geometry, 52:2, (240-259), Online publication date: 1-Sep-2014.
  30. Haviv I and Regev O On the lattice isomorphism problem Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms, (391-404)
  31. ACM
    García-Morchón O, Gómez-Pérez D, Gutiérrez J, Rietman R and Tolhuizen L The MMO problem Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (186-193)
  32. Li W New Variants of Lattice Problems and Their NP-Hardness Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (511-523)
  33. Hu G, Pan Y and Zhang F Solving Random Subset Sum Problem by lp-norm SVP Oracle Proceedings of the 17th International Conference on Public-Key Cryptography --- PKC 2014 - Volume 8383, (399-410)
  34. Meyer A (2013). On the number of lattice points in a small sphere and a recursive lattice decoding algorithm, Designs, Codes and Cryptography, 66:1-3, (375-390), Online publication date: 1-Jan-2013.
  35. Dadush D and Micciancio D Algorithms for the densest sub-lattice problem Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (1103-1122)
  36. Dadush D and Kun G Lattice sparsification and the approximate closest vector problem Proceedings of the twenty-fourth annual ACM-SIAM symposium on Discrete algorithms, (1088-1102)
  37. Georgescu A Anonymous lattice-based broadcast encryption Proceedings of the 2013 international conference on Information and Communication Technology, (353-362)
  38. Chen W, Peng L, Wang J, Li F, Tang M, Xiong W and Wang S (2013). Inapproximability results for the minimum integral solution problem with preprocessing over l∞ norm, Theoretical Computer Science, 478, (127-131), Online publication date: 1-Mar-2013.
  39. Cheng Q and Zhuang J (2013). On certain computations of Pisot numbers, Information Processing Letters, 113:8, (271-275), Online publication date: 1-Apr-2013.
  40. Hu G and Pan Y Improvements on Reductions among Different Variants of SVP and CVP Revised Selected Papers of the 14th International Workshop on Information Security Applications - Volume 8267, (39-51)
  41. Camenisch J, Neven G and Rückert M Fully anonymous attribute tokens from lattices Proceedings of the 8th international conference on Security and Cryptography for Networks, (57-75)
  42. ACM
    Cohen G, Shpilka A and Tal A On the degree of univariate polynomials over the integers Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (409-427)
  43. Buchheim C, Caprara A and Lodi A (2012). An effective branch-and-bound algorithm for convex quadratic integer programming, Mathematical Programming: Series A and B, 135:1-2, (369-395), Online publication date: 1-Oct-2012.
  44. Micciancio D The geometry of lattice cryptography Foundations of security analysis and design VI, (185-210)
  45. Aggarwal D and Maurer U The leakage-resilience limit of a computational problem is equal to its unpredictability entropy Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security, (686-701)
  46. ACM
    Novocin A, Stehlé D and Villard G An LLL-reduction algorithm with quasi-linear time complexity Proceedings of the forty-third annual ACM symposium on Theory of computing, (403-412)
  47. Dubey C and Holenstein T Approximating the closest vector problem using an approximate shortest vector oracle Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques, (184-193)
  48. Hanrot G, Pujol X and Stehlé D Algorithms for the shortest and closest lattice vector problems Proceedings of the Third international conference on Coding and cryptology, (159-190)
  49. Malekian E and Zakerolhosseini A NTRU-like public key cryptosystems beyond dedekind domain up to alternative algebra Transactions on computational science X, (25-41)
  50. Cayrel P, Lindner R, Rückert M and Silva R Improved zero-knowledge identification with lattices Proceedings of the 4th international conference on Provable security, (1-17)
  51. Hermans J, Schneider M, Buchmann J, Vercauteren F and Preneel B Parallel shortest lattice vector enumeration on graphics cards Proceedings of the Third international conference on Cryptology in Africa, (52-68)
  52. Rückert M Adaptively secure identity-based identification from lattices without random oracles Proceedings of the 7th international conference on Security and cryptography for networks, (345-362)
  53. Cash D, Hofheinz D, Kiltz E and Peikert C Bonsai trees, or how to delegate a lattice basis Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (523-552)
  54. Haviv I and Regev O The Euclidean distortion of flat tori Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques, (232-245)
  55. Micciancio D and Voulgaris P Faster exponential time algorithms for the shortest vector problem Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (1468-1480)
  56. ACM
    Micciancio D and Voulgaris P A deterministic single exponential time algorithm for most lattice problems based on voronoi cell computations Proceedings of the forty-second ACM symposium on Theory of computing, (351-358)
  57. Plantard T and Susilo W Recursive lattice reduction Proceedings of the 7th international conference on Security and cryptography for networks, (329-344)
  58. Agrawal S, Boneh D and Boyen X Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE Proceedings of the 30th annual conference on Advances in cryptology, (98-115)
  59. Agrawal S, Boneh D and Boyen X Efficient lattice (H)IBE in the standard model Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (553-572)
  60. Buchheim C, Caprara A and Lodi A An effective branch-and-bound algorithm for convex quadratic integer programming Proceedings of the 14th international conference on Integer Programming and Combinatorial Optimization, (285-298)
  61. May A and Ritzenhofen M Implicit Factoring Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09, (1-14)
  62. Vetter H, Ponnampalam V, Sandell M and Hoeher P (2009). Fixed complexity LLL algorithm, IEEE Transactions on Signal Processing, 57:4, (1634-1637), Online publication date: 1-Apr-2009.
  63. Grover P, Sahai A and Park S The finite-dimensional Witsenhausen counterexample Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, (604-613)
  64. ACM
    Nguyen P and Stehlé D (2009). Low-dimensional lattice basis reduction revisited, ACM Transactions on Algorithms, 5:4, (1-48), Online publication date: 1-Oct-2009.
  65. ACM
    Regev O (2009). On lattices, learning with errors, random linear codes, and cryptography, Journal of the ACM, 56:6, (1-40), Online publication date: 1-Sep-2009.
  66. Stehlé D, Steinfeld R, Tanaka K and Xagawa K Efficient Public Key Encryption Based on Ideal Lattices Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (617-635)
  67. Backes W and Wetzel S Parallel Lattice Basis Reduction Using a Multi-threaded Schnorr-Euchner LLL Algorithm Proceedings of the 15th International Euro-Par Conference on Parallel Processing, (960-973)
  68. Hartung R Cryptography Based on Quadratic Forms Research in Cryptology, (52-64)
  69. Gama N and Nguyen P Predicting lattice reduction Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology, (31-51)
  70. Peikert C and Vaikuntanathan V Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, (536-553)
  71. Micciancio D Efficient reductions among lattice problems Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, (84-93)
  72. ACM
    Gama N and Nguyen P Finding short lattice vectors within mordell's inequality Proceedings of the fortieth annual ACM symposium on Theory of computing, (207-216)
  73. ACM
    Gentry C, Peikert C and Vaikuntanathan V Trapdoors for hard lattices and new cryptographic constructions Proceedings of the fortieth annual ACM symposium on Theory of computing, (197-206)
  74. Hayashi S and Tada M (2008). A Digital Signature Scheme Based on NP-Complete Lattice Problems, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:5, (1253-1264), Online publication date: 1-May-2008.
  75. Arvind V and Joglekar P Algorithmic problems for metrics on permutation groups Proceedings of the 34th conference on Current trends in theory and practice of computer science, (136-147)
  76. Kawachi A, Tanaka K and Xagawa K Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (372-389)
  77. Han D, Kim M and Yeom Y Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003 Proceedings of the 10th international conference on Practice and theory in public-key cryptography, (107-117)
  78. ACM
    Haviv I and Regev O Tensor-based hardness of the shortest vector problem to within almost polynomial factors Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, (469-477)
  79. Hayashi S and Tada M (2007). New NP-Complete Problems Associated with Lattices, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A:5, (941-948), Online publication date: 1-May-2007.
  80. Micciancio D (2007). Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way Functions, Computational Complexity, 16:4, (365-411), Online publication date: 1-Dec-2007.
  81. Blömer J and Naewe S Sampling methods for shortest vectors, closest vectors and successive minima Proceedings of the 34th international conference on Automata, Languages and Programming, (65-77)
  82. Hanrot G and Stehlé D Improved analysis of Kannan's shortest lattice vector algorithm Proceedings of the 27th annual international cryptology conference on Advances in cryptology, (170-186)
  83. Kawachi A, Tanaka K and Xagawa K Multi-bit cryptosystems based on lattice problems Proceedings of the 10th international conference on Practice and theory in public-key cryptography, (315-329)
  84. Gutierrez J and Ibeas Á (2007). Inferring sequences produced by a linear congruential generator on elliptic curves missing high-order bits, Designs, Codes and Cryptography, 45:2, (199-212), Online publication date: 1-Nov-2007.
  85. Lyubashevsky V and Micciancio D Generalized compact knapsacks are collision resistant Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II, (144-155)
  86. Gama N, Howgrave-Graham N, Koy H and Nguyen P Rankin's constant and blockwise lattice reduction Proceedings of the 26th annual international conference on Advances in Cryptology, (112-130)
  87. Nguyen P and Stehlé D LLL on the average Proceedings of the 7th international conference on Algorithmic Number Theory, (238-256)
  88. Liu Y, Lyubashevsky V and Micciancio D On bounded distance decoding for general lattices Proceedings of the 9th international conference on Approximation Algorithms for Combinatorial Optimization Problems, and 10th international conference on Randomization and Computation, (450-461)
  89. Bogdanov A and Trevisan L (2006). Average-case complexity, Foundations and Trends® in Theoretical Computer Science, 2:1, (1-106), Online publication date: 1-Oct-2006.
  90. ACM
    Regev O and Rosen R Lattice problems and norm embeddings Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing, (447-456)
  91. Schnorr C (2006). Fast LLL-type lattice reduction, Information and Computation, 204:1, (1-25), Online publication date: 1-Jan-2006.
  92. Khot S (2006). Hardness of approximating the Shortest Vector Problem in high ℓp norms, Journal of Computer and System Sciences, 72:2, (206-219), Online publication date: 1-Mar-2006.
  93. Blackburn S, Gomez-Perez D, Gutierrez J and Shparlinski I (2006). Reconstructing noisy polynomial evaluation in residue rings, Journal of Algorithms, 61:2, (47-59), Online publication date: 1-Nov-2006.
  94. Regev O Lattice-based cryptography Proceedings of the 26th annual international conference on Advances in Cryptology, (131-141)
  95. Nguyen P and Regev O Learning a parallelepiped Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques, (271-288)
  96. Peikert C and Rosen A Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices Proceedings of the Third conference on Theory of Cryptography, (145-166)
  97. Nguyêñ P and Stern J Adapting density attacks to low-weight knapsacks Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security, (41-58)
  98. Gomez D, Gutierrez J and Ibeas A Cryptanalysis of the quadratic generator Proceedings of the 6th international conference on Cryptology in India, (118-129)
  99. Takashima K Practical modifications of leadbitter et al.'s repeated-bits side-channel analysis on (EC)DSA Proceedings of the 6th international conference on Information Security Applications, (259-270)
  100. Gómez D, Gutierrez J, Ibeas Á, Martínez C and Beivide R On Finding a Shortest Path in Circulant Graphs with Two Jumps Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (777-786)
  101. Nguên P and Stehlé D Floating-Point LLL revisited Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, (215-233)
  102. ACM
    Hallgren S Fast quantum algorithms for computing the unit group and class group of a number field Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (468-474)
  103. ACM
    Regev O On lattices, learning with errors, random linear codes, and cryptography Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, (84-93)
  104. Micciancio D The RSA group is pseudo-free Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques, (387-403)
  105. ACM
    Regev O New lattice based cryptographic constructions Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, (407-416)
  106. ACM
    Micciancio D Improved cryptographic hash functions with worst-case/average-case connection Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, (609-618)
Contributors
  • University of California, San Diego
  • University of California, Berkeley

Recommendations