Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Schnorr, C. P.
and
Hörner, H. H.
1995.
Advances in Cryptology — EUROCRYPT ’95.
Vol. 921,
Issue. ,
p.
1.
Rössner, Carsten
and
Schnorr, Claus P.
1996.
Integer Programming and Combinatorial Optimization.
Vol. 1084,
Issue. ,
p.
31.
Boneh, Dan
and
Venkatesan, Ramarathnam
1996.
Advances in Cryptology — CRYPTO ’96.
Vol. 1109,
Issue. ,
p.
129.
Coppersmith, Don
and
Shamir, Adi
1997.
Advances in Cryptology — EUROCRYPT ’97.
Vol. 1233,
Issue. ,
p.
52.
Hoffstein, Jeffrey
Pipher, Jill
and
Silverman, Joseph H.
1998.
Algorithmic Number Theory.
Vol. 1423,
Issue. ,
p.
267.
Fischlin, Roger
and
Seifert, Jean-Pierre
1999.
Cryptography and Coding.
Vol. 1746,
Issue. ,
p.
244.
Solé, P.
Charnes, C.
and
Martin, B.
2001.
A lattice-based McEliece scheme for encryption and signature.
Electronic Notes in Discrete Mathematics,
Vol. 6,
Issue. ,
p.
402.
Koy, Henrik
and
Schnorr, Claus Peter
2001.
Cryptography and Lattices.
Vol. 2146,
Issue. ,
p.
67.
Aardal, Karen
Weismantel, Robert
and
Wolsey, Laurence A.
2002.
Non-standard approaches to integer programming.
Discrete Applied Mathematics,
Vol. 123,
Issue. 1-3,
p.
5.
Aardal, Karen
and
Eisenbrand, Friedrich
2005.
Discrete Optimization.
Vol. 12,
Issue. ,
p.
171.
Takashima, Katsuyuki
2006.
Information Security Applications.
Vol. 3786,
Issue. ,
p.
259.
Blömer, Johannes
and
Naewe, Stefanie
2007.
Automata, Languages and Programming.
Vol. 4596,
Issue. ,
p.
65.
Plantard, Thomas
and
Susilo, Willy
2009.
Applied Cryptography and Network Security.
Vol. 5536,
Issue. ,
p.
456.
Schnorr, Claus Peter
2009.
The LLL Algorithm.
p.
145.
Blömer, Johannes
and
Naewe, Stefanie
2009.
Sampling methods for shortest vectors, closest vectors and successive minima.
Theoretical Computer Science,
Vol. 410,
Issue. 18,
p.
1648.
Schneider, Michael
and
Göttert, Norman
2011.
Cryptographic Hardware and Embedded Systems – CHES 2011.
Vol. 6917,
Issue. ,
p.
160.
Hanrot, Guillaume
Pujol, Xavier
and
Stehlé, Damien
2011.
Advances in Cryptology – CRYPTO 2011.
Vol. 6841,
Issue. ,
p.
447.
LI, JIANWEI
and
WEI, WEI
2013.
SLIDE REDUCTION, SUCCESSIVE MINIMA AND SEVERAL APPLICATIONS.
Bulletin of the Australian Mathematical Society,
Vol. 88,
Issue. 3,
p.
390.
Mikuš, Michal
and
Sýs, Marek
2013.
Mathematical and Engineering Methods in Computer Science.
Vol. 7721,
Issue. ,
p.
168.
Bay, Aslı
Boureanu, Ioana
Mitrokotsa, Aikaterini
Spulber, Iosif
and
Vaudenay, Serge
2013.
Information Security and Cryptology.
Vol. 7763,
Issue. ,
p.
371.