{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:05:03Z","timestamp":1742943903343,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319318745"},{"type":"electronic","value":"9783319318752"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31875-2_8","type":"book-chapter","created":{"date-parts":[[2016,3,23]],"date-time":"2016-03-23T09:05:02Z","timestamp":1458723902000},"page":"87-95","source":"Crossref","is-referenced-by-count":0,"title":["Two Types of Special Bases for Integral Lattices"],"prefix":"10.1007","author":[{"given":"Renzhang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yanbin","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-48910-X_1","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"D Boneh","year":"1999","unstructured":"Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key $$d$$ less than $$N^{0.292}$$ . In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 1\u201311. Springer, Heidelberg (1999)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-40041-4_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"L Ducas","year":"2013","unstructured":"Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V.: Lattice signatures and bimodal gaussians. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 40\u201356. Springer, Heidelberg (2013)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/BF01343106","volume":"125","author":"M Eichler","year":"1952","unstructured":"Eichler, M.: Note zur Theorie der Kristallgitter. Math. Ann. 125, 51\u201355 (1952)","journal-title":"Math. Ann."},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38348-9_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"S Garg","year":"2013","unstructured":"Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1\u201317. Springer, Heidelberg (2013)"},{"key":"8_CR5","doi-asserted-by":"crossref","DOI":"10.5479\/sil.324926.39088000932822","volume-title":"Disquisitiones Arithmeticae","author":"CF Gauss","year":"1801","unstructured":"Gauss, C.F.: Disquisitiones Arithmeticae. Springer, New York (1801)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: 41st ACM Symposium on Theory of Computing, pp. 169\u2013178. ACM, Maryland (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: 40st ACM Symposium on Theory of Computing, pp. 197\u2013206. ACM, Canada (2008)","DOI":"10.1145\/1374376.1374407"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory","author":"J Hoffstein","year":"1998","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267\u2013288. Springer, Heidelberg (1998)"},{"key":"8_CR9","unstructured":"Lagrange, J.L.: Recherches d\u2019arithm\u00e9tique. Nouveaux M\u00e9moires de l\u2019Acad\u00e9mie de Berlin (1773)"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"AK Lenstra","year":"1982","unstructured":"Lenstra, A.K., Lenstra, H.W., Lov\u00e1sz, L.: Factoring polynomials with rational coeffcients. Math. Ann. 261, 515\u2013534 (1982)","journal-title":"Math. Ann."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Odlyzko, A.M.: The rise and fall of knapsack cryptosystems. In: Symposia in Applied Mathematics, vol. 42, pp. 75\u201388. A.M.S. (1990)","DOI":"10.1090\/psapm\/042\/1095552"},{"key":"8_CR12","unstructured":"Shoup, V.: NTL: A library for ng number theory. http:\/\/www.shoup.net\/ntl\/"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31875-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,17]],"date-time":"2020-09-17T17:30:43Z","timestamp":1600363843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31875-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319318745","9783319318752"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31875-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}