{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:57:27Z","timestamp":1729663047341,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/acosis.2016.7843914","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:43:51Z","timestamp":1486658631000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Improving GGH cryptosystem using generalized low density lattices"],"prefix":"10.1109","author":[{"given":"Sarah","family":"Kamel","sequence":"first","affiliation":[]},{"given":"Mireille","family":"Sarkiss","sequence":"additional","affiliation":[]},{"given":"Ghaya Rekaya-Ben","family":"Othman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"126","article-title":"Improving lattice based cryptosystems using the Hermite normal form","author":"micciancio","year":"2001","journal-title":"Advances in Cryptography - Proceedings of Crypto"},{"key":"ref11","article-title":"The Security and Efficiency of Micciancios Cryptosys-tem","author":"ludwig","year":"2004","journal-title":"Technical Report available at"},{"key":"ref12","first-page":"416","article-title":"Improving GGH cryptosystem for large error vector","author":"yoshino","year":"2012","journal-title":"International Symposium on Information Theory and its Applications ISITA"},{"article-title":"Improving GGH public key scheme using low density lattice codes","year":"2015","author":"hooshmand","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.917684"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.312163"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2014.6970783"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133127"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF02579403"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620590"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258604"},{"key":"ref3","first-page":"99","article-title":"Generating hard instances of lattice problems","author":"ajtai","year":"1996","journal-title":"Proc 28th Ann ACM Symp on Theory of Computing (STOC '96)"},{"key":"ref6","first-page":"267","article-title":"NTRU: a ring based public key cryptosystem","volume":"1423","author":"hoffstein","year":"1998","journal-title":"Proceedings of ANTS III LNCS"},{"key":"ref5","first-page":"112","article-title":"Public-key cryptosystems from lattice reduction problems","volume":"1294","author":"goldreich","year":"1997","journal-title":"Proc CRYPTO '99 LNCS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref7","first-page":"42","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"mceliece","year":"1978","journal-title":"DSN Progr Rep Jet Prop Lab"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_1"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref9","first-page":"288","article-title":"Cryptanalysis of the Goldreich-Goldwasser-Halevi cryptosystem from Crypto'97","volume":"1666","author":"nguyen","year":"1999","journal-title":"Proc of CRYPTO"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2013.04.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1974.1055186"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/384101.384133"}],"event":{"name":"2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)","start":{"date-parts":[[2016,10,17]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7830757\/7843912\/07843914.pdf?arnumber=7843914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T15:58:37Z","timestamp":1513180717000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7843914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/acosis.2016.7843914","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}