Construction of lattices and applications in Information Theory
Efficiency and security of pre and post quantum cryptographic methods: theory and ...
Well-rounded lattices in R² via the canonical homomorphism and the twisted homomor...
Finite fields and applications to codes, lattices and cryptography