2000
DOI: 10.1007/10722028_4
|View full text |Cite
|
Sign up to set email alerts
|

Lattice Reduction in Cryptology: An Update

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
49
0

Year Published

2000
2000
2005
2005

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 77 publications
(51 citation statements)
references
References 68 publications
2
49
0
Order By: Relevance
“…It has been remarked in Section 2.1 of [8] and then in Section 2.4 of [10] that the following statement holds which is somewhat stronger than that usually used in the literature. …”
Section: Latticesmentioning
confidence: 90%
“…It has been remarked in Section 2.1 of [8] and then in Section 2.4 of [10] that the following statement holds which is somewhat stronger than that usually used in the literature. …”
Section: Latticesmentioning
confidence: 90%
“…Additional information on lattice theory can be found in numerous textbooks, such as [6,17]. For the important topic of lattice-based cryptanalysis, we refer to the recent survey [12].…”
Section: The Boneh-durfee Attackmentioning
confidence: 99%
“…For a discussion and a general exposition of Coppersmith's technique [5], see the recent surveys [2,12]. We describe the technique in the bivariate case, following a simplified approach due to HowgraveGraham [7].…”
Section: The Boneh-durfee Attackmentioning
confidence: 99%
“…Based on an early attack found by Coppersmith and Shamir [7], however, the underlying hard problem was soon reformulated as a lattice problem. See [22] for an update on how lattices have recently been used both as a cryptanalytic tool and as a potential basis for cryptography.…”
Section: Introductionmentioning
confidence: 99%