{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:54:31Z","timestamp":1773377671254,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/isit.2019.8849452","type":"proceedings-article","created":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T21:46:12Z","timestamp":1569534372000},"page":"1742-1746","source":"Crossref","is-referenced-by-count":2,"title":["Improved Upper Bounds on the Hermite and KZ Constants"],"prefix":"10.1109","author":[{"given":"Jinming","family":"Wen","sequence":"first","affiliation":[{"name":"College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, 510632, China"}]},{"given":"Xiao-Wen","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Computer Science, McGill University, Montreal, H3A 0E9, Canada"}]},{"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology and the College of Cyber Security, Jinan University, Guangzhou, 510632, China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Worst-case Hermite-Korkine-Zolotarev reduced lattice bases","author":"hanrot","year":"2008"},{"key":"ref11","first-page":"99","article-title":"Generating hard instances of lattice problems","author":"ajtai","year":"1996","journal-title":"Proc 28th Annu ACM Symp Theory Comput"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2708020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1914-1500976-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02295-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0273-9"},{"key":"ref16","volume":"327","author":"martinet","year":"2013","journal-title":"Perfect Lattices in Euclidean Spaces"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1090\/S1079-6762-04-00130-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00013-008-2856-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4064\/aa-27-1-125-142"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.090513.121465"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736536"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF02128669"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(87)90064-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2123889"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2868945"},{"key":"ref2","author":"micciancio","year":"2008","journal-title":"Lattice-Based Cryptography"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.800499"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2236144"},{"key":"ref20","article-title":"Matrix Computations, 4th","author":"golub","year":"2013"}],"event":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","location":"Paris, France","start":{"date-parts":[[2019,7,7]]},"end":{"date-parts":[[2019,7,12]]}},"container-title":["2019 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8827389\/8849208\/08849452.pdf?arnumber=8849452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:34:49Z","timestamp":1773347689000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8849452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isit.2019.8849452","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}