When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Lattice reduction - Wikipedia

    en.wikipedia.org/wiki/Lattice_reduction

    Lattice reduction algorithms are used in a number of modern number theoretical applications, including in the discovery of a spigot algorithm for . Although determining the shortest basis is possibly an NP-complete problem, algorithms such as the LLL algorithm [ 2 ] can find a short (not necessarily shortest) basis in polynomial time with ...

  3. Lenstra–Lenstra–Lovász lattice basis reduction algorithm

    en.wikipedia.org/wiki/Lenstra–Lenstra–Lovász...

    An early successful application of the LLL algorithm was its use by Andrew Odlyzko and Herman te Riele in disproving Mertens conjecture. [5]The LLL algorithm has found numerous other applications in MIMO detection algorithms [6] and cryptanalysis of public-key encryption schemes: knapsack cryptosystems, RSA with particular settings, NTRUEncrypt, and so forth.

  4. Korkine–Zolotarev lattice basis reduction algorithm - Wikipedia

    en.wikipedia.org/wiki/Korkine–Zolotarev_lattice...

    The Korkine–Zolotarev (KZ) lattice basis reduction algorithm or Hermite–Korkine–Zolotarev (HKZ) algorithm is a lattice reduction algorithm. For lattices in R n {\displaystyle \mathbb {R} ^{n}} it yields a lattice basis with orthogonality defect at most n n {\displaystyle n^{n}} , unlike the 2 n 2 / 2 {\displaystyle 2^{n^{2}/2}} bound of ...

  5. Lattice problem - Wikipedia

    en.wikipedia.org/wiki/Lattice_problem

    Lattice reduction algorithms aim, given a basis for a lattice, to output a new basis consisting of relatively short, nearly orthogonal vectors. The Lenstra–Lenstra–Lovász lattice basis reduction algorithm (LLL) was an early efficient algorithm for this problem which could output an almost reduced lattice basis in polynomial time. [33]

  6. Lattice-based cryptography - Wikipedia

    en.wikipedia.org/wiki/Lattice-based_cryptography

    Many lattice-based cryptographic schemes are known to be secure assuming the worst-case hardness of certain lattice problems. [3] [6] [7] I.e., if there exists an algorithm that can efficiently break the cryptographic scheme with non-negligible probability, then there exists an efficient algorithm that solves a certain lattice problem on any ...

  7. Minkowski's theorem - Wikipedia

    en.wikipedia.org/wiki/Minkowski's_theorem

    Thus, by running the LLL-lattice basis reduction algorithm with = /, we obtain a decomposition of as a sum of squares. Note that because every vector in L {\textstyle L} has norm squared a multiple of p {\textstyle p} , the vector returned by the LLL-algorithm in this case is in fact a shortest vector.

  8. Lattice (group) - Wikipedia

    en.wikipedia.org/wiki/Lattice_(group)

    For example, the Lenstra–Lenstra–Lovász lattice basis reduction algorithm (LLL) has been used in the cryptanalysis of many public-key encryption schemes, [2] and many lattice-based cryptographic schemes are known to be secure under the assumption that certain lattice problems are computationally difficult. [3]

  9. Coppersmith method - Wikipedia

    en.wikipedia.org/wiki/Coppersmith_method

    The Coppersmith method, proposed by Don Coppersmith, is a method to find small integer zeroes of univariate or bivariate polynomials, or small zeros modulo a given integer. The method uses the Lenstra–Lenstra–Lovász lattice basis reduction algorithm (LLL) to find a polynomial that has the same zeroes as the target polynomial but smaller ...