Skip to main content

New Results on Lattice Basis Reduction in Practice

  • Conference paper
Algorithmic Number Theory (ANTS 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1838))

Included in the following conference series:

Abstract

In this paper we introduce several new heuristics as to speed up known lattice basis reduction methods and improve the quality of the computed reduced lattice basis in practice. We analyze substantial experimental data and to our knowledge, we are the first to present a general heuristic for determining which variant of the reduction algorithm, for varied parameter choices, yields the most efficient reduction strategy for reducing a particular problem instance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ajtai, M.: Generating Hard Instances of Lattice Problems. In: Proceedings of the 28th ACM Symposium on Theory of Computing, pp. 99–108 (1996)

    Google Scholar 

  2. Ajtai, M., Dwork, C.: A Public-Key Cryptosystem with Worst-Case/Average- Case Equivalence. In: Proceedings of the 29th ACM Symposium on Theory of Computing, pp. 284–293 (1997)

    Google Scholar 

  3. Biehl, I., Buchmann, J., Papanikolaou, T.: LiDIA: A Library for Computational Number Theory. Technical Report 03/95, SFB 124, Universität des Saarlandes, Saarbrücken, Germany (1995)

    Google Scholar 

  4. Cohen, H.: A Course in Computational Algebraic Number Theory, 2nd edn. Springer, Heidelberg (1993)

    MATH  Google Scholar 

  5. Coppersmith, D.: Finding a Small Root of a Univariate Modular Equation. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 155–165. Springer, Heidelberg (1996)

    Google Scholar 

  6. Coster, M.J., Joux, A., LaMacchia, B.A., Odlyzko, A.M., Schnorr, C.P., Stern, J.: Improved Low-Density Subset Sum Algorithms. Journal of Computational Complexity 2, 111–128 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  7. Domich, P.D., Kannan, R., Trotter, L.E.: Hermite Normal Form Computation using Modulo Determinant Arithmetic. Mathematics Operations Research 12(1), 50–59 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  8. Goldreich, O., Goldwasser, S., Halevi, S.: Public-Key-Cryptosystems from Lat- tice Reduction Problems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 112–131. Springer, Heidelberg (1997)

    Google Scholar 

  9. Grötschel, M., Lovász, L., Schrijver, A.: Geometric Algorithms and Combina- torial Optimization, 2nd edn. Springer, Heidelberg (1993)

    Google Scholar 

  10. Havas, G., Majewski, B.S., Matthews, K.R.: Extended GCD Algorithms. Technical Report TR0302, The University of Queensland, Brisbane, Australia (1994)

    Google Scholar 

  11. Joux, A., Stern, J.: Lattice Reduction: A Toolbox for the Cryptanalyst. Journal of Cryptology 11(3), 161–185 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  12. Knuth, D.E.: The Art of Computer Programming. Seminumerical algo- rithms, 2nd edn., vol. 2. Addison-Wesley, Reading (1981)

    Google Scholar 

  13. Lenstra, A.K., Lenstra, H.W., Lovász, L.: Factoring Polynomials with Rational Coefficients. Math. Ann. 261, 515–534 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  14. LiDIA Group: LiDIA Manual. Universitát des Saarlandes/TU Darmstadt, Germany, see LiDIA homepage (1999), http://www.informatik.tu-darmstadt.de/TI/LiDIA

  15. Magma homepage (1999), http://www.maths.usyd.edu.au:8000/comp/magma/Overview.html

  16. Nguyen, P.: Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto 1997. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 288–304. Springer, Heidelberg (1999)

    Google Scholar 

  17. Nguyen, P., Stern, J.: Cryptanalysis of a Fast Public Key Cryptosystem Pre- sented at SAC 1997. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, p. 213. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  18. NTL homepage (1999), http://www.cs.wisc.edu/~shoup/ntl

  19. Pohst, M.E., Zassenhaus, H.J.: Algorithmic Algebraic Number Theory. Cambridge University Press, Cambridge (1989)

    Book  MATH  Google Scholar 

  20. Radziszowski, S., Kreher, D.L.: Solving Subset Sum Problems with the L 3 Algorithm. J. Combin. Math. Combin. Computation 3, 49–63 (1988)

    MATH  MathSciNet  Google Scholar 

  21. Rickert, N.W.: Efficient Reduction of Quadratic Forms. In: Proceedings of Computers and Mathematics 1989, pp. 135–139 (1989)

    Google Scholar 

  22. Schnorr, C.P., Euchner, M.: Lattice Basis Reduction: Improved Practical Al- gorithms and Solving Subset Sum Problems. In: Budach, L. (ed.) FCT 1991. LNCS, vol. 529, pp. 68–85. Springer, Heidelberg (1991)

    Google Scholar 

  23. de Weger, B.: Algorithms for Diophantine Equations. PhD Thesis, Centrum voor Wiskunde en Informatica, Amsterdam, Netherlands (1988)

    Google Scholar 

  24. Wetzel, S.: Lattice Basis Reduction Algorithms and their Applications. PhD Thesis, Universitát des Saarlandes, Saarbrúcken, Germany (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Backes, W., Wetzel, S. (2000). New Results on Lattice Basis Reduction in Practice. In: Bosma, W. (eds) Algorithmic Number Theory. ANTS 2000. Lecture Notes in Computer Science, vol 1838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10722028_7

Download citation

  • DOI: https://doi.org/10.1007/10722028_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67695-9

  • Online ISBN: 978-3-540-44994-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics