共 22 条
- [1] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
- [2] Ajtai M., 1998, 30 ANN ACM S THEOR C, P266
- [3] Ajtai Miklos, 1997, P 29 ANN ACM S THEOR, P284, DOI [DOI 10.1145/258533.258604, 10.1145/258533.258604]
- [5] Coster MJ, 1992, COMPUT COMPLEX, V2, P111
- [6] Enumerative Lattice Algorithms in Any Norm via M-Ellipsoid Coverings [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 580 - 589
- [7] Frieze A.M., 1989, SIAM J COMPUT, V18, P550
- [8] Gentry C, 2008, ACM S THEORY COMPUT, P197
- [9] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178