{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:14:18Z","timestamp":1725516858139},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540794981"},{"type":"electronic","value":"9783540794998"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79499-8_32","type":"book-chapter","created":{"date-parts":[[2008,8,16]],"date-time":"2008-08-16T16:35:36Z","timestamp":1218904536000},"page":"412-426","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of General Lu-Lee Type Systems"],"prefix":"10.1007","author":[{"given":"Haijian","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ping","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Daoshun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yiqi","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","first-page":"16","volume-title":"COMSAT Technical Review","author":"S.C. Lu","year":"1979","unstructured":"Lu, S.C., Lee, L.N.: A Simple and Effective Public-Key Cryptosystem. In: COMSAT Technical Review, vol.\u00a09(1), pp. 16\u201323. Springer, Heidelberg (1979)"},{"key":"32_CR2","unstructured":"Adleman, L., Rivest, R.: How to break the Lu-Lee Public-Key Cryptosystem, MIT Laboratory for Computer Science Technical, July 24, 1-9 (1979)"},{"key":"32_CR3","first-page":"301","volume":"35","author":"J.M. Goethals","year":"1980","unstructured":"Goethals, J.M., Couvreur, C.: A Cryptanalytic Attack on the Lu-Lee Public-Key Cryptosystem. Philips J. Res.\u00a035, 301\u2013306 (1980)","journal-title":"Philips J. Res."},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Kochanski, M.J.: Remarks on Lu and Lee\u2019s Proposals. Cryptologia\u00a04(4) (1980)","DOI":"10.1080\/0161-118091855130"},{"issue":"18","key":"32_CR5","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1049\/el:19850560","volume":"21","author":"B.S. Adiga","year":"1985","unstructured":"Adiga, B.S., Shankar, P.: Modified Lu-Lee Cryptosystem. Electronics Letters,\u00a021(18), 794\u2013795 (1985)","journal-title":"Electronics Letters,"},{"issue":"13","key":"32_CR6","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1049\/el:19890556","volume":"25","author":"L.X. Duan","year":"1989","unstructured":"Duan, L.X., Nian, C.C.: Modified Lu-Lee Cryptosystem. Electronics Letters\u00a025(13), 826 (1989)","journal-title":"Electronics Letters"},{"issue":"3","key":"32_CR7","doi-asserted-by":"publisher","first-page":"1601","DOI":"10.1049\/el:19901026","volume":"26","author":"L.D. Xing","year":"1990","unstructured":"Xing, L.D., Sheng, L.G.: Cryptanalysis of New Modified Lu-Lee Cryptosystems. Electronics Letters\u00a026(3), 1601\u20131602 (1990)","journal-title":"Electronics Letters"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/5.4443","volume":"76","author":"E.F. Brickell","year":"1988","unstructured":"Brickell, E.F., Odlyzko, A.M.: Cryptanalysis: A survey of recent results. Proceedings of the IEEE\u00a076, 578\u2013592 (1988)","journal-title":"Proceedings of the IEEE"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Kannan, R.: Improved Algorithm for Integer Programming and Related Lattice Problems. In: Proc. 15th ACM Symposium on Theory of Computing, pp. 193\u2013206 (1983)","DOI":"10.1145\/800061.808749"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BF01457454","volume":"261","author":"A.K. Lenstra","year":"1982","unstructured":"Lenstra, A.K., Lenstra Jr., H.W., Lov\u00e1sz, L.: Factoring polynomials with rational coefficients. Math. Ann.\u00a0261, 513\u2013534 (1982)","journal-title":"Math. Ann."},{"key":"32_CR11","unstructured":"Schnorr, C.P.: Fast LLL-type lattice reduction. Unpublished draft available at (October, 2004), \n                    \n                      http:\/\/www.mi.informatik.uni-frankfurt.de\/research\/papers.html"},{"key":"32_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/11426639_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"P.Q. Nguyen","year":"2005","unstructured":"Nguyen, P.Q., Stehl\u00e9, D.: Floating-Point LLL Revisited. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 215\u2013233. Springer, Heidelberg (2005)"},{"key":"32_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/11792086_18","volume-title":"Algorithmic Number Theory","author":"P.Q. Nguyen","year":"2006","unstructured":"Nguyen, P.Q., Stehl\u00e9, D.: LLL on the Average. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol.\u00a04076, pp. 238\u2013256. Springer, Heidelberg (2006)"},{"key":"32_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/3-540-44670-2_12","volume-title":"Cryptography and Lattices","author":"P.Q. Nguyen","year":"2001","unstructured":"Nguyen, P.Q., Stern, J.: The Two Faces of Lattices in Cryptology. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol.\u00a02146, pp. 146\u2013180. Springer, Heidelberg (2001)"},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02579403","volume":"6","author":"L. Babai","year":"1986","unstructured":"Babai, L.: On Lov\u0301asz lattice reduction and the nearest lattice point problem. Combinatorica\u00a06, 1\u201313 (1986)","journal-title":"Combinatorica"},{"key":"32_CR16","first-page":"601","volume-title":"Proc. 33rd STOC","author":"M. Ajtai","year":"2001","unstructured":"Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: Proc. 33rd STOC, pp. 601\u2013610. ACM, New York (2001)"},{"key":"32_CR17","unstructured":"Shoup, V.: NTL. Number Theory C++ Library, \n                    \n                      http:\/\/www.shoup.net\/ntl\/"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79499-8_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:23:52Z","timestamp":1619522632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79499-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540794981","9783540794998"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79499-8_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}