000 03804nam a22005775i 4500
001 978-3-642-02295-1
003 DE-He213
005 20140220084523.0
007 cr nn 008mamaa
008 100301s2010 gw | s |||| 0|eng d
020 _a9783642022951
_9978-3-642-02295-1
024 7 _a10.1007/978-3-642-02295-1
_2doi
050 4 _aQA76.9.D35
072 7 _aUMB
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM031000
_2bisacsh
082 0 4 _a005.74
_223
100 1 _aNguyen, Phong Q.
_eeditor.
245 1 4 _aThe LLL Algorithm
_h[electronic resource] :
_bSurvey and Applications /
_cedited by Phong Q. Nguyen, Brigitte Vallée.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aXIV, 496 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Security and Cryptography,
_x1619-7100
505 0 _aThe History of the LLL-Algorithm -- Hermite’s Constant and Lattice Algorithms -- Probabilistic Analyses of Lattice Reduction Algorithms -- Progress on LLL and Lattice Reduction -- Floating-Point LLL: Theoretical and Practical Aspects -- LLL: A Tool for Effective Diophantine Approximation -- Selected Applications of LLL in Number Theory -- The van Hoeij Algorithm for Factoring Polynomials -- The LLL Algorithm and Integer Programming -- Using LLL-Reduction for Solving RSA and Factorization Problems -- Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign -- The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance -- Cryptographic Functions from Worst-Case Complexity Assumptions -- Inapproximability Results for Computational Problems on Lattices -- On the Complexity of Lattice Problems with Polynomial Approximation Factors.
520 _aThe LLL algorithm is a polynomial-time lattice reduction algorithm, named after its inventors, Arjen Lenstra, Hendrik Lenstra and László Lovász. The algorithm has revolutionized computational aspects of the geometry of numbers since its introduction in 1982, leading to breakthroughs in fields as diverse as computer algebra, cryptology and algorithmic number theory. This book consists of 15 survey chapters on computational aspects of Euclidean lattices and their main applications. Topics covered include polynomial factorization, lattice reduction algorithms, applications in number theory, integer programming, provable security, lattice-based cryptography and complexity. The authors include many detailed motivations, explanations and examples, and the contributions are largely self-contained. The book will be of value to a wide range of researchers and graduate students working in related fields of theoretical computer science and mathematics.
650 0 _aComputer science.
650 0 _aData structures (Computer science).
650 0 _aComputer software.
650 0 _aComputational complexity.
650 0 _aAlgorithms.
650 0 _aNumber theory.
650 0 _aMathematical optimization.
650 1 4 _aComputer Science.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aAlgorithms.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aDiscrete Mathematics in Computer Science.
650 2 4 _aNumber Theory.
650 2 4 _aOptimization.
700 1 _aVallée, Brigitte.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642022944
830 0 _aInformation Security and Cryptography,
_x1619-7100
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-02295-1
912 _aZDB-2-SCS
999 _c111403
_d111403