@inproceedings {Buchmann,
   author       = {J. Buchmann},
   title        = {A Subexponential Algorithm for the Determination of Class
                  Groups and Regulators of Algebraic Number Fields},
   booktitle    = {S\'eminaire de Th\'eorie des Nombres, Paris 1988--1989},
   editor       = {Catherine Goldstein},
   publisher    = {Birkh\"auser},
   address      = {Boston},
   series       = {Progress in Mathematics},
   year         = {1990},
   pages        = {27--41}
}

@inproceedings {JacobsonHNF,
   author       = {M. Giesbrecht and M. Jacobson  and A. Storjohann},
   title        = {Algorithms for large integer matrix problems},
   booktitle    = {Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-14},
   editor       = {S. Boztas and I. Shparlinski},
   publisher    = {Springer Verlag},
   address      = {Heidelberg},
   series       = {Lecture Notes in Computer Science},
   year         = {2001},
   volume       = {2227},
   pages        = {297--307}
}

@inproceedings {Jacobson_heuristic,
   author       = {M. Jacobson and  S. Ramachandran and H.C. Williams},
   title        = {Numerical results on class groups of imaginary quadratic fields},
   booktitle    = {Proceedings of the 7th Algorithmic Number Theory Symposium},
   publisher    = {Springer Verlag},
   series       = {Lecture Notes in Computer Science},
   year         = {2006},
   volume       = {4076},
   pages        = {87--101}
}

@inproceedings{Arne_diophantine,
 author = {T. Mulders and A. Storjohann},
 title = {Diophantine linear system solving},
 booktitle = {ISSAC '99: Proceedings of the 1999 international symposium on Symbolic and algebraic computation},
 year = {1999},
 isbn = {1-58113-073-2},
 pages = {181--188},
 location = {Vancouver, British Columbia, Canada},
 doi = {http://doi.acm.org/10.1145/309831.309905},
 publisher = {ACM},
 address = {New York, NY, USA},
 }


@inproceedings{Enge,
 	author = {A. Enge and P. Gaudry},
 	title = {An {L} (1/3 + {$\epsilon$}) Algorithm for the Discrete Logarithm Problem for Low Degree Curves},
 	booktitle = {EUROCRYPT '07: Proceedings of the 26th annual international conference on Advances in Cryptology},
 	year = {2007},
 	isbn = {978-3-540-72539-8},
 	pages = {379--393},
 	location = {Barcelona, Spain},
	series   = {Lecture Notes in Computer Science},
 	doi = {http://dx.doi.org/10.1007/978-3-540-72540-4_22},
 	publisher = {Springer-Verlag},
 	address = {Berlin, Heidelberg}
 }

@Article{Enge_L12,
	author = {A. Enge},
	title = {Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time},
	journal = {Mathematics of Computation},
	year = 2001,
	volume = {71},
	pages = {729--742}
}

@Article{pohst,
	author = {C. Fieker and M. Pohst},
	title = {Dependency of units in number fields},
	journal = {Mathematics of Computation},
	year = 2006,
	volume = {75},
	pages = {1507--1518}
}

@Article{weil,
	author = {P. Gaudry and F. Hess and N. Smart},
	title = {Constructive and destructive facets of Weil descent on elliptic curves},
	journal = {Journal of Cryptology},
	year = 2002,
	volume = {15},
	pages = {19--46}
}


@Article{bach,
	author = {E. Bach},
	title = {Explicit bounds for primality testing and related problems},
	journal = {Mathematics of Computation},
	year = 1990,
	volume = {191},
	pages = {355--380}
}

@Article{teske,
	author = {E. Teske},
	title = {An elliptic curve trapdoor system},
	journal = {Journal of Cryptology},
	year = 2006,
	volume = {19},
	pages = {115--133}
}

@Article{brent,
	author = {R.P. Brent and H.T. Kung},
	title = {Fast algorithms for manipulating formal power series},
	journal = {Journal of the ACM},
	year = 1978,
	volume = {25},
	pages = {581--595}
}


@Article{LLL,
  	author = {A.K. Lenstra and H.W. Lenstra and L.Lov\'{a}sz},
  	title = {Factoring polynomials with rational coefficients},
  	journal = {Mathematische Annalen},
  	year = 1982,
	volume = {261},
  	pages = {515--534},
	publisher = {Springer-Verlag}
}

@Article{lenstra_heuristic,
  	author = {H. Cohen and H.W. Lenstra},
  	title = {Heuristics on class groups of number fields},
  	journal = {Number Theory, Lecture notes in Math.},
  	year = 1983,
	volume = {1068},
  	pages = {33--62},
	publisher = {Springer-Verlag},
	adress = {New York}
}

@Article{littlewood,
  	author = {J.E. Littlewood},
  	title = {On the class number of the corpus $P(\sqrt{-k})$},
  	journal = {Proc. London Math.Soc},
  	year = 1928,
	volume = {27},
  	pages = {358--372}
}


@inproceedings{Buchmann_lattice,
 	author = {J. Buchmann and M. Pohst},
 	title = {Computing a lattice basis from a system of generating vectors},
 	booktitle = {EUROCAL '87: Proceedings of the European Conference on Computer Algebra},
 	year = {1989},
 	isbn = {3-540-51517-8},
 	pages = {54--63},
 	publisher = {Springer-Verlag},
 	address = {London, UK}
 }

@misc{Buchmann_preprint,
    	author = {J. Buchmann and V. Kessler},
    	title = {Computing a reduced basis from a generating system},
	note = {Preprint},
	year = {1990},
    	howpublished = {citeseer.ist.psu.edu/buchmann93computing.html}
}



@article {biasse_quad,
   author       = {J-F. Biasse},
   title        = {Improvements in the computation of ideal class groups of
imaginary quadratic number fields},
   journal      = {Advances of Mathematics of Communications},
   volume       = {4},
   number       = {2},
   year         = {2010},
   pages        = {141-154}
 }

@Article{magma,
  	author = {W. Bosma and J. Cannon and C. Playoust},
  	title = {The {M}agma algebra system. {I}. The user language},
  	journal = {J. Symbolic Comput.},
  	year = 1997,
	volume = {24},
	number = {3-4},
  	pages = {235--265}
}

@inproceedings{Jao,
  author    = {D. Jao and
               V. Soukharev},
  editor    = {Guillaume Hanrot and
               Fran\c{c}ois Morain and
               Emmanuel Thom{\'e}},
  title     = {A Subexponential Algorithm for Evaluating Large Degree Isogenies},
  booktitle = {Algorithmic Number Theory, 9th International Symposium,
               ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings},
  year      = {2010},
  pages     = {219-233},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {6197},
  isbn      = {978-3-642-14517-9}
}

@inproceedings{BCL,
  author    = {Reinier Br{\"o}ker and
               Denis Xavier Charles and
               Kristin Lauter},
  title     = {Evaluating Large Degree Isogenies and Applications to Pairing
               Based Cryptography},
  booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International
               Conference, Egham, UK, September 1-3, 2008. Proceedings},
  year      = {2008},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {5209},
 editor    = {Steven D. Galbraith and
               Kenneth G. Paterson},
  pages     = {100-112}
}


@inproceedings {BiaJac10,
   author       = {J-F. Biasse and M. J. Jacobson Jr},
   title        = {Practical improvements to class group and regulator
computation of real quadratic fields},
   booktitle    = {Algorithmic Number Theory Symposium - ANTS IX},
   editor       = {Guillaume Hanrot and François Morain and Emmanuel Thomé},
   publisher    = {Springer-Verlag},
   address      = {Berlin},
   year         = {2010},
   series       = {Lecture Notes in Computer Science},
   volume       = {6197},
   pages        = {50-65}
 }

@inproceedings {BiaJacSil10,
   author       = {J-F. Biasse and M. J. Jacobson Jr and
A. K. Silvester},
   title        = {Security estimates for quadratic field based
cryptosystems},
   booktitle    = {Australasian Conferance in Information Security and
Privacy - ACISP 15},
   editor       = {Philip Hawkes and Ron Steinfeld},
   publisher    = {Springer-Verlag},
   address      = {Berlin},
   year         = {2010},
   series       = {Lecture Notes in Computer Science},
   volume       = {6168},
  pages         = {233--247}
 }

@INPROCEEDINGS{HMiq,
   AUTHOR = "S. Hamdy and B. M{\"o}ller",
   TITLE = "Security of cryptosystems based on class groups of imaginary quadratic orders",
   BOOKTITLE = "Advances in Cryptology - ASIACRYPT 2000",
   SERIES = "Lecture Notes in Computer Science",
   VOLUME = "1976",
   PAGES = "234-247",
   YEAR = "2000" }

@article{FlaPau,
	author="Flassenberg, Ralf and Paulus, Sachar",
	title={Sieving in function fields},
	language="English",
	journal="Experimental Mathematics",
	volume="8",
	number="4",
	pages="339-349",
	year="1999"
}


@misc{biasseL13,
	author = {J-F. Biasse},
	title = {An $L(1/3)$ algorithm for ideal class group and regulator computation in certain number fields},
	note = { To appear in \textit{Mathematics of Computation} },
	note = { http://www.lix.polytechnique.fr/~biasse/papers/CLL13.pdf }
}

@misc{biasseDLPL13,
	author = {J-F. Biasse},
	title = {An $L(1/3)$ algorithm for solving the discrete logarithm problem and the principal ideal problem in certain number fields},
	note = { http://www.lix.polytechnique.fr/~biasse/papers/DLL13.pdf }
}

@misc{bernstein,
    	author = {D.J. Bernstein},
    	title = {How to find small factors of integers},
	note = {Preprint},
    	howpublished = {to appear in \textit{Mathematics of Computation}}
}

@InProceedings{vollmer,
  	author = {U. Vollmer},
  	title  = {A note on the {H}ermite Basis Computation of Large
                  Integer Matrices},
  	booktitle = {International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} '03},
  	year = 2003,
  	editor = {J. Rafael Sendra},
  	publisher = {{ACM} Press},
  	pages = "255--257"
}

@INPROCEEDINGS{Vreg,
   AUTHOR = "U. Vollmer",
   TITLE = "An accelerated {B}uchmann algorithm for regulator computation in real quadratic fields",
   BOOKTITLE = "Algorithmic Number Theory --- ANTS-V",
   SERIES = "Lecture Notes in Computer Science",
   VOLUME = "2369",
   YEAR = "2002",
   PAGES = "148-162" }

@InProceedings{cavallar,
        author = {S. Cavallar},
        title = {Strategies in Filtering in the Number Field Sieve},
        booktitle = {ANTS-IV: Proceedings of the 4th International Symposium on Algorithmic Number Theory},
	editor = {},
	publisher = {Springer-Verlag},
	series = {Lecture Note in Computer Science},
        volume = {1838},	
	pages = {209--232},
        year = {2000}
}

@inproceedings{LenstraShanks,
 	author = {A.K. Lenstra},
 	title = {On the calculation of regulators and class numbers of quadratic fields},
 	booktitle = {Journ\'{e}es arithm\'{e}tiques},
 	year = {1982},
 	pages = {123--150},
 	publisher = {Cambridge Univ. Press}
 }

@inproceedings{Lenstra2LP,
 	author = {A.K. Lenstra and M.S. Manasse},
 	title = {Factoring with two large primes (extended abstract)},
 	booktitle = {Advances in Cryptology - EUROCRYPT '90},
 	year = {1991},
 	pages = {72--82},
	series = {Lecture notes in computer science},
 	publisher = {Springer Verlag}
 }

@article{Canfield,
  	author = {E.R. Canfield and P. Erd\"{o}s and C. Pomerance},
  	year = 1983,
  	title = {On a problem of Oppenheim concerning `Factorisatio Numerorum'},
  	journal = {J. Number Theory},
  	volume = 17,
  	pages = {1--28}
}

@InProceedings{Shanks,
        author = {D. Shanks},
        title = {Class number, a theory of factorization, and genera},
        booktitle = {Proceedings of Symposia in Pure Mathematics},
	editor = {W. J. LeVeque and E. G. Straus},
	publisher = {American Mathematical Society},
        volume = {20},	
	pages = {415--440},
        year = {1969}
}

@inproceedings{NFS,
 author = {A. K. Lenstra and H. W. Lenstra and M. S. Manasse and J. M. Pollard},
 title = {The number field sieve},
 booktitle = {Proceedings of the twenty-second annual ACM symposium on Theory of computing},
 series = {STOC '90},
 year = {1990},
 isbn = {0-89791-361-2},
 location = {Baltimore, Maryland, United States},
 pages = {564--572},
 numpages = {9},
 url = {http://doi.acm.org/10.1145/100216.100295},
 doi = {http://doi.acm.org/10.1145/100216.100295},
 acmid = {100295},
 publisher = {ACM},
 address = {New York, NY, USA}
}


@inproceedings{RSA768,
  editor    = {T. Rabin},
 author    = {T. Kleinjung and
               K. Aoki and
               J. Franke and
               A. K. Lenstra and
               E. Thom{\'e} and
               J. W. Bos and
               P. Gaudry and
               A. Kruppa and
               P. L. Montgomery and
               D. A. Osvik and
               H. J. J. te Riele and
               A. Timofeev and
               P. Zimmermann},
title     = {Factorization of a 768-Bit RSA Modulus},
  booktitle     = {Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology
               Conference, Santa Barbara, CA, USA, August 15-19, 2010.
               Proceedings},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  year      = {2010},
  isbn      = {978-3-642-14622-0}
}


@InProceedings{Shanks2,
        author = {D. Shanks},
        title = {The infrastructure of a real quadratic field and its applications},
        booktitle = {Proceedings of the 1972 Number Theory Conference},
	publisher = {Boulder: University of Colorado},	
	pages = {217--224},
        year = {1972}
}

@Article{hafner,
  	author = {J.L. Hafner and K.S. McCurley},
  	title = {A rigorous subexponential algorithm for computation of class groups},
  	journal = {Journal of American Society},
  	year = 1989,
	volume = {2},
  	pages = {839--850}
}

@Article{mignotte,
  	author = {M. Mignotte},
  	title = {An inequality about factors of polynomials},
  	journal = {Mathematics of Computation},
  	year = 1974,
	volume = {28},
  	pages = {1153--1157}
}

@Article{rosser,
	author = {J.B. Rosser and L. Schoenfeld},
	title = {Approximate formulas for some functions of prime numbers},
	journal = {Illinois Journal of Mathematics},
	year = 1962,
	volume = {6},
	pages = {64--94}
}

@Article{pell,
	author = {M. Jacobson and H.C Williams},
	title = {The size of the fundamental solutions of consecutive Pell equations},
	journal = {Experimental Mathematics},
	year = 2000,
	volume = {4},
	pages = {631--640}
}

@BOOK{pell_book,
	author = {M. Jacobson and H.C. Williams},
	title = {Solving the Pell equation},
	publisher = {Springer-Verlag},
	year = 2009,
	series = {CMS Books in Mathematics}
}


@Article{shaffer,
	author = {M. Jacobson and  \'{A}. Pint\'{e}r and P. Walsh},
	title = {A computational approach for solving $y^2 = 1^k + 2^k + ... + x^k$},
	journal = {Mathematics of computation},
	year = 2003,
	volume = {72},
	pages = {2099--2110}
}

@InProceedings{real_crypto,
        author = {M. Jacobson and R. Scheidler and H.C. Williams},
        title = {The efficiency and security of a real quadratic field based key exchange protocol},
        booktitle = {Public-Key Cryptography and Computational Number Theory},
	editor = {K. Alster and J. Urbanowicz and H.C. Williams},
	publisher = {Walter de Gruyter},	
	pages = {89--112},
        year = {2001}
}

@phdthesis{Arne,
        author = {A. Storjohann},
        title = {Algorithms for Matrix Canonical Forms},
        school = {Department of Computer Science, Swiss Federal Institute of Technology -- ETH},
        year = {2000}
}

@mastersthesis{nies,
	author = {S. Nies},
	title = {Kurze Darstellung von Ordnungen},
	school = {University of Saarland, Saarbr\"{u}cken},
	year = {1994}
}

@mastersthesis{velichka,
	author = {M. Velichka},
	title = {Improvements to Index Calculus Algorithms for Solving the Hyperelliptic Curve Discrete Logarithm Problem Over Characteristic Two Finite Fields},
	school = {Departement of Computer Science, University of Calgary},
	year = {2008}
}

@BOOK{cohen,
	author = {H. Cohen},
	title = {A course in computational algebraic number theory},
	publisher = {Springer-Verlag},
	year = 1991,
	series = {Graduate Texts in Mathematics},
	volume = 138
}

@phdthesis{JacobsonPhd,
        author = {M. Jacobson},
        title = {Subexponential Class Group Computation in Quadratic Orders},
        school = {Technische Universität Darmstadt, Darmstadt, Germany},
	publisher = {Shaker Verlag GmbH},
        year = {1999}
}

@misc{linbox,
	title = {Linbox},
	howpublished = {http://www.linalg.org/}
}

@InProceedings{LyuMic06icalp,
  Author         = {V. Lyubashevsky and D. Micciancio},
  Title          = {Generalized compact knapsacks are collision resistant},
  year           = 2006,
  Editor         = {I. Wegener and V. Sassone and B. Preneel},
  Series         = {Lecture Notes in Computer Science},
  Address        = {Venice, Italy},
  Publisher      = {Springer-Verlag},
  booktitle      = {Proceedings of the 33rd international colloquium on
                   automata, languages and programming - {ICALP} 2006},
  month          = jul,
  volume         = 4052,
  pages          = {144--155},
}

@Article{Mic07cyclic,
  author = 	 {D. Micciancio},
  title = 	 {Generalized compact knapsaks, cyclic lattices, and
                   efficient one-way functions},
  journal = 	 {Computational Complexity},
  year = 	 2007,
  volume = 	 16,
  number =       4,
  pages = 	 {365--411},
  month = 	 dec,
  note = 	 {Prelim. in FOCS 2002}
}

@InProceedings{Mic02cyclic,
  Author         = {D. Micciancio},
  Title          = {Generalized compact knapsaks, cyclic lattices, and
                   efficient one-way functions from worst-case complexity
                   assumptions},
  BookTitle      = {Proceedings of the 43rd Annual Symposium on
                   Foundations of Computer Science - {FOCS} 2002.},
  Address        = {Vancouver, Canada},
  Publisher      = {IEEE},
  Pages          = {356--365},
  month          = nov,
  year           = 2002,
  note           = {Full version in Computational Complexity 16:365-411},
}
	Alon Rosen

@inproceedings{RosenTCC,
  title={Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices.},
  booktitle={Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006},
  pages={145-166},
  url={http://www.iacr.org/cryptodb/archive/2006/TCC/3601/3601.pdf},
  author={C. Peikert and A. Rosen},
  year=2006
}


@inproceedings{SSTX09,
author = {D. Stehl{\'e} and 
          R. Steinfeld and 
          K. Tanaka and
          K. Xagawa},
title = {Efficient Public-Key Encryption Based on Ideal Lattices
                  (extended abstract)},
booktitle = {Advances in Cryptology - ASIACRYPT 2008, 14th
                  International Conference on the Theory and
                  Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11,
                  2008. Proceedings},
publisher = {Springer},
pages     = {617--635},
series = {LNCS},
volume = {5912},
year = 2009,
}


@article{fieker_rep,
  author    = {C. Fieker},
  title     = {Minimizing representations over number fields},
  journal   = {J. Symb. Comput.},
  volume    = {38},
  number    = {1},
  year      = {2004},
  pages     = {833-842},
  ee        = {http://dx.doi.org/10.1016/j.jsc.2004.03.001},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@misc{pseudo_HNF,
    	author = {J-F. Biasse and C. Fieker},
    	title = {A polynomial time algorithm for computing the HNF of a module over the ring of intergers of a number field},
	note = {Preprint: will be published on ArXiV before the jury examines the application}
}


@inproceedings{stehle_fieker_LLL,
  author    = {C. Fieker and D. Stehl{\'e}},
  title     = {Short Bases of Lattices over Number Fields},
  booktitle = {Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings},
  editor    = {G. Hanrot and F. Morain and E. Thom{\'e}},
  pages     = {157-173},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {6197},
  isbn      = {978-3-642-14517-9},
  year      = {2010}
}

@BOOK{cohen2,
	author = {H. Cohen},
	title = {Advanced topics in computational algebraic number theory},
	publisher = {Springer-Verlag},
	year = 1991,
	series = {Graduate Texts in Mathematics},
	volume = 193
}

@inproceedings{salsa20,
author    = {D. Bernstein},
pages     = {84-97},
  editor    = {M. Robshaw and
               O. Billet},
  title     = {The Salsa20 Family of Stream Ciphers},
  booktitle = {New Stream Cipher Designs - The eSTREAM Finalists},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {4986},
  year      = {2008}
}

@misc{crowley,
    	author = {P. Crowley},
    	title = {Truncated differential cryptanalysis of five rounds of Salsa20},
	note = {Presented at SASC 2006},
    	howpublished = {http://www.ciphergoth.org/crypto/salsa20/salsa20-cryptanalysis.pdf}
}

@inproceedings{Orange_salsa,
author    = {S. Fischer and
               W. Meier and
               C. Berbain and
               J.-F. Biasse and
               M. Robshaw},
  title     = {Non-randomness in eSTREAM Candidates Salsa20 and TSC-4},
  editor    = {R. Barua and
               T. Lange},
  booktitle     = {Progress in Cryptology - INDOCRYPT 2006, 7th International
               Conference on Cryptology in India, Kolkata, India, December
               11-13, 2006, Proceedings},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {4329},
pages     = {2-16},
  year      = {2006}
}

@proceedings{Salsa_8,
author    = {J.-P. Aumasson and
               S. Fischerand
               S. Khazaei and
               W. Meier and
               C. Rechberger},
  title     = {New Features of Latin Dances: Analysis of Salsa, ChaCha,
               and Rumba},
  editor    = {K. Nyberg},
  booktitle     = {Fast Software Encryption, 15th International Workshop, FSE
               2008, Lausanne, Switzerland, February 10-13, 2008, Revised
               Selected Papers},
  publisher = {Springer},
  series    = {Lecture Notes in Computer Science},
  volume    = {5086},
pages     = {470-488},
  year      = {2008}
}

@book{guruswami_phd,
 author = {V. Guruswami},
 title = {List Decoding of Error-Correcting Codes: Winning Thesis of the 2002 ACM Doctoral Dissertation Competition (Lecture Notes in Computer Science)},
 year = {2005},
 isbn = {3540240519},
 publisher = {Springer-Verlag New York, Inc.},
 address = {Secaucus, NJ, USA},
}

@article{wasserman,
  author    = {M. A. Shokrollahi and H. Wasserman},
  title     = {List Decoding of Algebraic-Geometric Codes},
  journal   = {IEEE Transactions on Information Theory},
  volume    = {45},
  number    = {2},
  year      = {1999},
  pages     = {432-437}
}

@inproceedings{guruswami_sudan_soft_CRT,
 author = {Guruswami, V. and Sahai, A. and Sudan, M.},
 title = {Soft-decision decoding of Chinese remainder codes},
 booktitle = {Proceedings of the 41st Annual Symposium on Foundations of Computer Science},
 year = {2000},
 isbn = {0-7695-0850-2},
 pages = {159--168},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
}

@InProceedings{lenstra_nb_fld,
  author    = {H. Lenstra},
  title     = {Codes from algebraic number fields},
  booktitle = {Mathematics and computer science II, Fundamental contributions in the Netherlands since 1945},
  series    = {CWI Monograph},
  editor    = {M. Hazewinkel and J.K. Lenstra and L.G. L.T. Meertens},
  volume    = {4},
  year      = {1986},
  pages     = {94--104},
  address    = {North-Holland, Amsterdam}
}

@article{guruswami_nb_fld,
  author    = {V. Guruswami},
  title     = {Constructions of codes from number fields},
  journal   = {IEEE Transactions on Information Theory},
  volume    = {49},
  number    = {3},
  year      = {2003},
  pages     = {594--603},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@misc{biasse_codes,
    	author = {J.-F. Biasse and G. Quintin},
    	title = {An algorithm for list deconding number field codes},
	note = {Submitted to SODA 2012},
    	howpublished = {http://arxiv.org/abs/1107.2321}
}