Multi-round passive attacks on server-aided RSA protocols
Proceedings of the 7th ACM conference on Computer and communications security
Secure Server-Aided Signature Generation
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Dimension Reduction Methods for Convolution Modular Lattices
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
The Two Faces of Lattices in Cryptology
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
The Insecurity of Nyberg-Rueppel and Other DSA-Like Signature Schemes with Partially Known Nonces
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
Non-standard approaches to integer programming
Discrete Applied Mathematics
A Measure for the Non-Orthogonality of a Lattice Basis
Combinatorics, Probability and Computing
Advanced receiver algorithms for MIMO wireless communications
Proceedings of the conference on Design, automation and test in Europe: Proceedings
Reduced-complexity mimo detector with close-to ml error rate performance
Proceedings of the 17th ACM Great Lakes symposium on VLSI
Designs, Codes and Cryptography
Certification of the QR factor R and of lattice basis reducedness
Proceedings of the 2007 international symposium on Symbolic and algebraic computation
EURASIP Journal on Applied Signal Processing
Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way Functions
Computational Complexity
Suboptimal MIMO detector based on Viterbi algorithm
MUSP'07 Proceedings of the 7th WSEAS International Conference on Multimedia Systems & Signal Processing
Finding short lattice vectors within mordell's inequality
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
System architecture and implementation of MIMO sphere decoders on FPGA
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Gröbner bases for public key cryptography
Proceedings of the twenty-first international symposium on Symbolic and algebraic computation
Rigorous and Efficient Short Lattice Vectors Enumeration
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Parallelization of Sphere-Decoding Methods
High Performance Computing for Computational Science - VECPAR 2008
H-LLL: using householder inside LLL
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Low-dimensional lattice basis reduction revisited
ACM Transactions on Algorithms (TALG)
Known---Plaintext---Only Attack on RSA---CRT with Montgomery Multiplication
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Stopping criterion for complexity reduction of sphere decoding
IEEE Communications Letters
The error probability of the fixed-complexity sphere decoder
IEEE Transactions on Signal Processing
Probabilistic spherical detection and VLSI implementation for multiple-antenna systems
IEEE Transactions on Circuits and Systems Part I: Regular Papers
On fast-decodable space-time block codes
IEEE Transactions on Information Theory
Fast LLL-type lattice reduction
Information and Computation
Schnorr-euchner sphere decoder with statistical pruning for MIMO systems
ISWCS'09 Proceedings of the 6th international conference on Symposium on Wireless Communication Systems
Search sequence determination for tree search based detection algorithms
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
IEEE Journal on Selected Areas in Communications - Special issue on realizing GBPS wireless personal area networks
Performance of sphere decoding of block codes
IEEE Transactions on Communications
Reduced complexity sphere decoding via a reordered lattice representation
IEEE Transactions on Communications
Efficient implementation of quasi-maximum-likelihood detection based on semidefinite relaxation
IEEE Transactions on Signal Processing
Attacking the Chor-Rivest cryptosystem by improved lattice reduction
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Noisy polynomial interpolation and noisy chinese remaindering
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On further reduction of complexity in tree pruning based sphere search
IEEE Transactions on Communications
Low-complexity decoding via reduced dimension maximum-likelihood search
IEEE Transactions on Signal Processing
A hybrid lattice-reduction and meet-in-the-middle attack against NTRU
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Improved analysis of Kannan's shortest lattice vector algorithm
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
APCC'09 Proceedings of the 15th Asia-Pacific conference on Communications
Proceedings of the forty-second ACM symposium on Theory of computing
Searching in the delta lattice: an efficient MIMO detection for iterative receivers
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Low complexity SIC-based MIMO detection with list generation in the LR domain
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Block detection of multiple symbol DPSK in a statistically unknown time-varying channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Complexity reduced soft-in soft-out sphere detection based on search tuples
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Multi-strata codes: space-time block codes with low detection complexity
IEEE Transactions on Communications
Complexity-efficient enumeration techniques for soft-input, soft-output sphere decoding
IEEE Communications Letters
An adaptive reduced complexity K-best decoding algorithm with early termination
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
High-throughput and area-efficient MIMO symbol detection based on modified Dijkstra's search
IEEE Transactions on Circuits and Systems Part I: Regular Papers
IEEE Transactions on Information Theory
Soft-input soft-output single tree-search sphere decoding
IEEE Transactions on Information Theory
A low cost multi-standard near-optimal soft-output sphere decoder: algorithm and architecture
Proceedings of the Conference on Design, Automation and Test in Europe
Faster exponential time algorithms for the shortest vector problem
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
A scalable VLSI architecture for soft-input soft-output depth-first sphere decoding
IEEE Transactions on Circuits and Systems II: Express Briefs
Matrix-lifting semi-definite programming for detection in multiple antenna systems
IEEE Transactions on Signal Processing
Accelerating lattice reduction with FPGAs
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Parallel enumeration of shortest lattice vectors
Euro-Par'10 Proceedings of the 16th international Euro-Par conference on Parallel processing: Part II
Performance and complexity analysis of infinity-norm sphere-decoding
IEEE Transactions on Information Theory
A radius adaptive K-Best decoder with early termination: algorithm and VLSI architecture
IEEE Transactions on Circuits and Systems Part I: Regular Papers - Special section on 2009 IEEE custom integrated circuits conference
Solving Ellipsoid-Constrained Integer Least Squares Problems
SIAM Journal on Matrix Analysis and Applications
Design and implementation of a sort-free K-best sphere decoder
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A High Throughput Configurable SDR Detector for Multi-user MIMO Wireless Systems
Journal of Signal Processing Systems
Better key sizes (and attacks) for LWE-based encryption
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Analysis of gauss-sieve for solving the shortest vector problem in lattices
WALCOM'11 Proceedings of the 5th international conference on WALCOM: algorithms and computation
A pipeline interleaved heterogeneous SIMD soft processor array architecture for MIMO-OFDM detection
ARC'11 Proceedings of the 7th international conference on Reconfigurable computing: architectures, tools and applications
Decoding the golden code: a VLSI design
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Lattice reduction algorithms: theory and practice
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Algorithms for the shortest and closest lattice vector problems
IWCC'11 Proceedings of the Third international conference on Coding and cryptology
Analyzing blockwise lattice algorithms using dynamical systems
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
A parallel implementation of GaussSieve for the shortest vector problem in lattices
PaCT'11 Proceedings of the 11th international conference on Parallel computing technologies
Random sampling for short lattice vectors on graphics cards
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Extreme enumeration on GPU and in clouds: how many dollars you need to break SVP challenges
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Cryptanalysis of a quadratic compact knapsack public-key cryptosystem
Computers & Mathematics with Applications
Approximate polynomial GCD over integers
Journal of Symbolic Computation
Dynamic threshold and cheater resistance for shamir secret sharing scheme
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Practical lattice basis sampling reduction
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Experimenting with faults, lattices and the DSA
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
Lattice enumeration using extreme pruning
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Rankin's constant and blockwise lattice reduction
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Microprocessors & Microsystems
BKZ 2.0: better lattice security estimates
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Secret key leakage from public key perturbation of DLP-Based cryptosystems
Cryptography and Security
A new efficient ordering scheme for sphere detection
Journal of Electrical and Computer Engineering
A power-efficient soft-output detector for spatial-multiplexing MIMO communications
Journal of Electrical and Computer Engineering - Special issue on Implementations of Signal-Processing Algorithms for OFDM Systems
Efficient multiplication over extension fields
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Adaptive Parallel and Iterative QRDM Detection Algorithms for MIMO Multiplexing Systems
Wireless Personal Communications: An International Journal
Full lattice basis reduction on graphics cards
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
Multi-user Multi-stream Vector Perturbation Precoding
Wireless Personal Communications: An International Journal
Solving BDD by enumeration: an update
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Low-complexity dominance-based sphere decoder for MIMO systems
Signal Processing
A best-first soft/hard decision tree searching MIMO decoder for a 4×4 64-QAM system
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Using bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
Outsourcing computation of modular exponentiations in cloud computing
Cluster Computing
Hi-index | 0.26 |