Book description
First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time algorithm for factoring polynomials with rational coefficients. It very quickly became an essential tool in integer linear programming problems and was later adapted for use in cryptanalysis. This book provides an i
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents
- List of Figures
- Preface
- About the Author
- 1. Introduction to Lattices (1/4)
- 1. Introduction to Lattices (2/4)
- 1. Introduction to Lattices (3/4)
- 1. Introduction to Lattices (4/4)
- 2. Two-Dimensional Lattices (1/4)
- 2. Two-Dimensional Lattices (2/4)
- 2. Two-Dimensional Lattices (3/4)
- 2. Two-Dimensional Lattices (4/4)
- 3. Gram-Schmidt Orthogonalization (1/3)
- 3. Gram-Schmidt Orthogonalization (2/3)
- 3. Gram-Schmidt Orthogonalization (3/3)
- 4. The LLL Algorithm (1/7)
- 4. The LLL Algorithm (2/7)
- 4. The LLL Algorithm (3/7)
- 4. The LLL Algorithm (4/7)
- 4. The LLL Algorithm (5/7)
- 4. The LLL Algorithm (6/7)
- 4. The LLL Algorithm (7/7)
- 5. Deep Insertions (1/4)
- 5. Deep Insertions (2/4)
- 5. Deep Insertions (3/4)
- 5. Deep Insertions (4/4)
- 6. Linearly Dependent Vectors (1/3)
- 6. Linearly Dependent Vectors (2/3)
- 6. Linearly Dependent Vectors (3/3)
- 7. The Knapsack Problem (1/4)
- 7. The Knapsack Problem (2/4)
- 7. The Knapsack Problem (3/4)
- 7. The Knapsack Problem (4/4)
- 8. Coppersmith's Algorithm (1/3)
- 8. Coppersmith's Algorithm (2/3)
- 8. Coppersmith's Algorithm (3/3)
- 9. Diophantine Approximation (1/2)
- 9. Diophantine Approximation (2/2)
- 10. The Fincke-Pohst Algorithm (1/5)
- 10. The Fincke-Pohst Algorithm (2/5)
- 10. The Fincke-Pohst Algorithm (3/5)
- 10. The Fincke-Pohst Algorithm (4/5)
- 10. The Fincke-Pohst Algorithm (5/5)
- 11. Kannan's Algorithm (1/4)
- 11. Kannan's Algorithm (2/4)
- 11. Kannan's Algorithm (3/4)
- 11. Kannan's Algorithm (4/4)
- 12. Schnorr's Algorithm (1/3)
- 12. Schnorr's Algorithm (2/3)
- 12. Schnorr's Algorithm (3/3)
- 13. NP-Completeness (1/3)
- 13. NP-Completeness (2/3)
- 13. NP-Completeness (3/3)
- 14. The Hermite Normal Form (1/8)
- 14. The Hermite Normal Form (2/8)
- 14. The Hermite Normal Form (3/8)
- 14. The Hermite Normal Form (4/8)
- 14. The Hermite Normal Form (5/8)
- 14. The Hermite Normal Form (6/8)
- 14. The Hermite Normal Form (7/8)
- 14. The Hermite Normal Form (8/8)
- 15. Polynomial Factorization (1/8)
- 15. Polynomial Factorization (2/8)
- 15. Polynomial Factorization (3/8)
- 15. Polynomial Factorization (4/8)
- 15. Polynomial Factorization (5/8)
- 15. Polynomial Factorization (6/8)
- 15. Polynomial Factorization (7/8)
- 15. Polynomial Factorization (8/8)
- Bibliography (1/3)
- Bibliography (2/3)
- Bibliography (3/3)
Product information
- Title: Lattice Basis Reduction
- Author(s):
- Release date: August 2011
- Publisher(s): CRC Press
- ISBN: 9781439807040
You might also like
book
Bent Functions
Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete …
book
Reconfigurable Computing
Reconfigurable Computing marks a revolutionary and hot topic that bridges the gap between the separate worlds …
book
Topics in Parallel and Distributed Computing
Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well …
book
Bio-inspired Algorithms for Engineering
Bio-inspired Algorithms for Engineering builds a bridge between the proposed bio-inspired algorithms developed in the past …