共 62 条
[1]
Accellera, 2017, SYSTEMC
[2]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[3]
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[4]
[Anonymous], 2017, IACR EPRINT
[5]
Binkert Nathan, 2011, Computer Architecture News, V39, P1, DOI 10.1145/2024716.2024718
[6]
Bortolotti D., 2013, P 2013 IEEE 27 INT P
[7]
Bos J., 2015, P 2015 IEEE S SEC PR
[8]
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1006-1018
[9]
Braithwaite M., 2016, GOOGLE SECURITY BLOG