{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:54:48Z","timestamp":1725490488977},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540751861"},{"type":"electronic","value":"9783540751878"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75187-8_4","type":"book-chapter","created":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T11:13:38Z","timestamp":1188645218000},"page":"31-44","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient LLL Gram Using Buffered Transformations"],"prefix":"10.1007","author":[{"given":"Werner","family":"Backes","sequence":"first","affiliation":[]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Backes, W., Wetzel, S.: Heuristics on Lattice Basis Reduction in Practice. ACM Journal on Experimental Algorithms 7 (2002)","DOI":"10.1145\/944618.944619"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11745853_1","volume-title":"Public Key Cryptography - PKC 2006","author":"D. Bleichenbacher","year":"2006","unstructured":"Bleichenbacher, D., May, A.: New Attacks on RSA with Small Secret CRT-Exponents. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 1\u201313. Springer, Heidelberg (2006)"},{"key":"4_CR3","volume-title":"Undergraduate Texts in Mathematics","author":"H. Cohen","year":"1993","unstructured":"Cohen, H.: A Course in Computational Algebraic Number Theory. In: Undergraduate Texts in Mathematics, Springer, Heidelberg (1993)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/3-540-46416-6_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"M. Coster","year":"1991","unstructured":"Coster, M., LaMacchia, B., Odlyzko, A., Schnorr, C.: An Improved Low-Density Subset Sum Algorithm. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 54\u201367. Springer, Heidelberg (1991)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/11426639_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"M. Ernst","year":"2005","unstructured":"Ernst, M., Jochemsz, E., May, A., de Weger, B.: Partial Key Exposure Attacks on RSA up to Full Size Exponents. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 371\u2013384. Springer, Heidelberg (2005)"},{"key":"4_CR6","unstructured":"Filipovic, B.: Implementierung der Gitterbasenreduktion in Segmenten. Master\u2019s thesis, University of Frankfurt am Main (2002)"},{"key":"4_CR7","unstructured":"Granlund, T.: GNU MP: The GNU Multiple Precision Arithmetic Library. SWOX AB, 4.2.1 edition (2006)"},{"key":"4_CR8","unstructured":"Klimovitski, A.: Using SSE and SSE2: Misconceptions and Reality. Intel Developer UPDATE Magazine (March 2001), http:\/\/www.intel.com\/technology\/magazine\/computing\/sw03011.pdf"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-44670-2_7","volume-title":"Cryptography and Lattices","author":"H. Koy","year":"2001","unstructured":"Koy, H., Schnorr, C.: Segment LLL-Reduction of Lattice Bases. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol.\u00a02146, pp. 67\u201380. Springer, Heidelberg (2001)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/3-540-44670-2_8","volume-title":"Cryptography and Lattices","author":"H. Koy","year":"2001","unstructured":"Koy, H., Schnorr, C.: Segment LLL-Reduction with Floating Point Orthogonalization. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol.\u00a02146, pp. 81\u201396. Springer, Heidelberg (2001)"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A. Lenstra","year":"1982","unstructured":"Lenstra, A., Lenstra, H., Lov\u00e0sz, L.: Factoring Polynomials with Rational Coefficients. Math. Ann.\u00a0261, 515\u2013534 (1982)","journal-title":"Math. Ann."},{"key":"4_CR12","unstructured":"May, A.: Cryptanalysis of NTRU, 1999 (preprint)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/978-3-540-24847-7_26","volume-title":"Algorithmic Number Theory","author":"P. Nguyen","year":"2004","unstructured":"Nguyen, P., Stehl\u00e8, D.: Low-Dimensional Lattice Basis Reduction Revisited. In: Buell, D.A. (ed.) Algorithmic Number Theory. LNCS, vol.\u00a03076, pp. 338\u2013357. Springer, Heidelberg (2004)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/11426639_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"P. Nguyen","year":"2005","unstructured":"Nguyen, P., Stehl\u00e8, D.: Floating-Point LLL Revisited. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 215\u2013233. Springer, Heidelberg (2005)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/11792086_18","volume-title":"Algorithmic Number Theory","author":"P. Nguyen","year":"2006","unstructured":"Nguyen, P., Stehl\u00e8, D.: LLL on the Average. In: Hess, F., Pauli, S., Pohst, M. (eds.) Algorithmic Number Theory. LNCS, vol.\u00a04076, pp. 238\u2013256. Springer, Heidelberg (2006)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1007\/3-540-48405-1_18","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.Q. Nguyen","year":"1999","unstructured":"Nguyen, P.Q.: Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto 1997. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 288\u2013304. Springer, Heidelberg (1999)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/10722028_4","volume-title":"Algorithmic Number Theory","author":"P.Q. Nguyen","year":"2000","unstructured":"Nguyen, P.Q., Stern, J.: Lattice Reduction in Cryptology: An Update. In: Bosma, W. (ed.) Algorithmic Number Theory. LNCS, vol.\u00a01838, pp. 85\u2013112. Springer, Heidelberg (2000)"},{"key":"4_CR18","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511661952","volume-title":"Algorithmic Algebraic Number Theory","author":"M.E. Pohst","year":"1989","unstructured":"Pohst, M.E., Zassenhaus, H.: Algorithmic Algebraic Number Theory. Cambridge University Press, Cambridge (1989)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/3-540-54458-5_51","volume-title":"Fundamentals of Computation Theory","author":"C. Schnorr","year":"1991","unstructured":"Schnorr, C., Euchner, M.: Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems. In: Budach, L. (ed.) FCT 1991. LNCS, vol.\u00a0529, pp. 68\u201385. Springer, Heidelberg (1991)"},{"key":"4_CR20","unstructured":"Stallman, R.M., Community, G.D.: GNU Compiler Collection. Free Software Foundation, Inc. (2005)"},{"key":"4_CR21","unstructured":"Stehl\u00e9, D.: The New LLL Routine in the Magma Computational Algebra System. Magma 2006 Conference (2006), http:\/\/magma.maths.usyd.edu.au\/Magma2006\/"},{"key":"4_CR22","unstructured":"Wetzel, S.: Lattice Basis Reduction Algorithms and their Applications. PhD thesis, Universit\u00e4t des Saarlandes (1998)"},{"key":"4_CR23","unstructured":"fpLLL - Homepage (Damien Stehl\u00e9) (July 2007), http:\/\/www.loria.fr\/~stehle\/"},{"key":"4_CR24","unstructured":"GCC - Homepage (July 2007), http:\/\/gcc.gnu.org"},{"key":"4_CR25","unstructured":"Auto-Vectorization in GCC (July 2007), http:\/\/gcc.gnu.org\/projects\/tree-ssa\/vectorization.html"},{"key":"4_CR26","unstructured":"GMP - Homepage, http:\/\/gmplib.org\/"},{"key":"4_CR27","unstructured":"AMD64 patch for GMP 4.2 (July 2007), http:\/\/www.loria.fr\/~gaudry\/mpn_AMD64\/index.html"},{"key":"4_CR28","unstructured":"Lattice Basis Reduction Experiments (July 2007), http:\/\/www.cs.stevens.edu\/~wbackes\/lattice\/"},{"key":"4_CR29","unstructured":"Magma - Homepage (July 2007), http:\/\/magma.maths.usyd.edu.au\/"},{"key":"4_CR30","unstructured":"NTL - Homepage (July (2007), http:\/\/www.shoup.net\/ntl\/"}],"container-title":["Lecture Notes in Computer Science","Computer Algebra in Scientific Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75187-8_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:54:50Z","timestamp":1619506490000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75187-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540751861","9783540751878"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75187-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}