{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T07:56:38Z","timestamp":1721030198449},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2014,8,17]],"date-time":"2014-08-17T00:00:00Z","timestamp":1408233600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11432-013-4967-6","type":"journal-article","created":{"date-parts":[[2014,8,16]],"date-time":"2014-08-16T11:18:08Z","timestamp":1408187888000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A new parallel lattice reduction algorithm for BKZ reduced bases"],"prefix":"10.1007","volume":"57","author":[{"given":"XiangHui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xing","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"XiangHui","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,17]]},"reference":[{"key":"4967_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-78240-4","volume-title":"Geometric Algorithm and Combinatorial Optimization","author":"M Grotschel","year":"1993","unstructured":"Grotschel M, Lovasz L, Schrijver A. Geometric Algorithm and Combinatorial Optimization. Berlin: Springer-Verlag, 1993"},{"key":"4967_CR2","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A K Lenstra","year":"1982","unstructured":"Lenstra A K, Lenstra H W, Lovasz L. Factoring polynomials with rational coefficients. Mathematiche Annalen, 1982, 261: 515\u2013534","journal-title":"Mathematiche Annalen"},{"key":"4967_CR3","first-page":"155","volume-title":"Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Saragossa","author":"D Coppersmith","year":"1996","unstructured":"Coppersmith D. Finding a small root of a univariate modular equation. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, 1996. 155\u2013165"},{"key":"4967_CR4","doi-asserted-by":"crossref","first-page":"1511","DOI":"10.1007\/s11432-010-4029-2","volume":"53","author":"L D Han","year":"2010","unstructured":"Han L D, Wang X Y, Xu G W. On an attack on RSA with small CRT-exponents. Sci China Inf Sci, 2010, 53: 1511\u20131518","journal-title":"Sci China Inf Sci"},{"key":"4967_CR5","volume-title":"Some results on cryptanalysis of RSA and factorization","author":"S Santanu","year":"2011","unstructured":"Santanu S. Some results on cryptanalysis of RSA and factorization. Dissertation for Ph.D. Degree. Kolkata: Indian Statistical Institute, 2011"},{"key":"4967_CR6","first-page":"155","volume":"4","author":"R S Kumar","year":"2012","unstructured":"Kumar R S, Narasimam C, Setty S P. Lattice based tools in cryptanalysis for public key cryptography. Int J Netw Secur Appl, 2012, 4: 155\u2013162","journal-title":"Int J Netw Secur Appl"},{"key":"4967_CR7","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1017\/S0963548300001371","volume":"3","author":"C P Schnorr","year":"1994","unstructured":"Schnorr C P. Block reduced lattice bases and successive minima. Comb Probab Comput, 1994, 3: 507\u2013522","journal-title":"Comb Probab Comput"},{"key":"4967_CR8","first-page":"1","volume-title":"Proceedings of 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge","author":"A Joux","year":"2012","unstructured":"Joux A. A tutorial on high performance computing applied to cryptanalysis. In: Proceedings of 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, 2012. 1\u20137"},{"key":"4967_CR9","first-page":"27","volume-title":"Proceedings of 11th International Conference, ICA3PP, Melbourne","author":"W Backes","year":"2011","unstructured":"Backes W, Wetzel S. Improving the parallel Schnorr-Euchner LLL algorithm. In: Proceedings of 11th International Conference, ICA3PP, Melbourne, 2011. 27\u201339"},{"key":"4967_CR10","first-page":"211","volume-title":"Proceedings of 16th International Euro-Par Conference, Ischia","author":"O Dagdelen","year":"2010","unstructured":"Dagdelen O, Schneider M. Parallel enumeration of shortest lattice vectors. In: Proceedings of 16th International Euro-Par Conference, Ischia, 2010. 211\u2013222"},{"key":"4967_CR11","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-02295-1_2","volume-title":"The LLL Algorithm: Survey and Applications","author":"P Q Nguyen","year":"2009","unstructured":"Nguyen P Q, Valle B. The LLL Algorithm: Survey and Applications. 1st ed. Berlin: Springer, 2009. 19\u201371","edition":"1st ed."},{"key":"4967_CR12","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/BF01581144","volume":"66","author":"C P Schnorr","year":"1994","unstructured":"Schnorr C P, Euchner M. Lattice basis reduction: improved practical algorithms and sovling subset sum problems. Math Program, 1994, 66: 181\u2013199","journal-title":"Math Program"},{"key":"4967_CR13","first-page":"447","volume-title":"Proceedings of 31st Annual Cryptology Conference, Santa Barbara","author":"G Hanrot","year":"2011","unstructured":"Hanrot G, Pujol X, Stehle D. Analyzing blockwise lattice algorithms using dynamical systems. In: Proceedings of 31st Annual Cryptology Conference, Santa Barbara, 2011. 447\u2013464"},{"key":"4967_CR14","first-page":"238","volume-title":"Proceedings of 7th International Symposium, ANTS-VII, Berlin","author":"P Q Nguyen","year":"2006","unstructured":"Nguyen P Q, Stehle D. LLL on the average. In: Proceedings of 7th International Symposium, ANTS-VII, Berlin, 2006. 238\u2013256"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4967-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-013-4967-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4967-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:37:54Z","timestamp":1559403474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-013-4967-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,17]]},"references-count":14,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["4967"],"URL":"https:\/\/doi.org\/10.1007\/s11432-013-4967-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,17]]}}}