X
Contents
§11.3. LLL-Reduction 230
§11.4. Lattice Attacks on Knapsack Cryptosystems 235
§11.5. Remarks on Lattice-Based Cryptosystems 239
Appendix: Further Reading 241
Bibliography 245
Previous Page Next Page