TEST - Catálogo BURRF
   

The LLL Algorithm : Survey and Applications / edited by Phong Q. Nguyen, Brigitte Vallée.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Information Security and CryptographyEditor: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010Descripción: xiv, 496 páginas recurso en líneaTipo de contenido:
  • texto
Tipo de medio:
  • computadora
Tipo de portador:
  • recurso en línea
ISBN:
  • 9783642022951
Formatos físicos adicionales: Edición impresa:: Sin títuloClasificación LoC:
  • QA76.9.D35
Recursos en línea:
Contenidos:
The History of the LLL-Algorithm -- Hermite’s Constant and Lattice Algorithms -- Probabilistic Analyses of Lattice Reduction Algorithms -- Progress on LLL and Lattice Reduction -- Floating-Point LLL: Theoretical and Practical Aspects -- LLL: A Tool for Effective Diophantine Approximation -- Selected Applications of LLL in Number Theory -- The van Hoeij Algorithm for Factoring Polynomials -- The LLL Algorithm and Integer Programming -- Using LLL-Reduction for Solving RSA and Factorization Problems -- Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign -- The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance -- Cryptographic Functions from Worst-Case Complexity Assumptions -- Inapproximability Results for Computational Problems on Lattices -- On the Complexity of Lattice Problems with Polynomial Approximation Factors.
Resumen: The LLL algorithm is a polynomial-time lattice reduction algorithm, named after its inventors, Arjen Lenstra, Hendrik Lenstra and László Lovász. The algorithm has revolutionized computational aspects of the geometry of numbers since its introduction in 1982, leading to breakthroughs in fields as diverse as computer algebra, cryptology and algorithmic number theory. This book consists of 15 survey chapters on computational aspects of Euclidean lattices and their main applications. Topics covered include polynomial factorization, lattice reduction algorithms, applications in number theory, integer programming, provable security, lattice-based cryptography and complexity. The authors include many detailed motivations, explanations and examples, and the contributions are largely self-contained. The book will be of value to a wide range of researchers and graduate students working in related fields of theoretical computer science and mathematics.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Springer eBooks

The History of the LLL-Algorithm -- Hermite’s Constant and Lattice Algorithms -- Probabilistic Analyses of Lattice Reduction Algorithms -- Progress on LLL and Lattice Reduction -- Floating-Point LLL: Theoretical and Practical Aspects -- LLL: A Tool for Effective Diophantine Approximation -- Selected Applications of LLL in Number Theory -- The van Hoeij Algorithm for Factoring Polynomials -- The LLL Algorithm and Integer Programming -- Using LLL-Reduction for Solving RSA and Factorization Problems -- Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign -- The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance -- Cryptographic Functions from Worst-Case Complexity Assumptions -- Inapproximability Results for Computational Problems on Lattices -- On the Complexity of Lattice Problems with Polynomial Approximation Factors.

The LLL algorithm is a polynomial-time lattice reduction algorithm, named after its inventors, Arjen Lenstra, Hendrik Lenstra and László Lovász. The algorithm has revolutionized computational aspects of the geometry of numbers since its introduction in 1982, leading to breakthroughs in fields as diverse as computer algebra, cryptology and algorithmic number theory. This book consists of 15 survey chapters on computational aspects of Euclidean lattices and their main applications. Topics covered include polynomial factorization, lattice reduction algorithms, applications in number theory, integer programming, provable security, lattice-based cryptography and complexity. The authors include many detailed motivations, explanations and examples, and the contributions are largely self-contained. The book will be of value to a wide range of researchers and graduate students working in related fields of theoretical computer science and mathematics.

Para consulta fuera de la UANL se requiere clave de acceso remoto.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha