共 50 条
- [31] Towards Security Authentication for IoT Devices with Lattice-Based ZK NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 141 - 150
- [32] Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 432 - 451
- [34] Lattice-Based Three Party Authenticated Key Agreement Scheme in Medical IoT for Post-Quantum Environment IEEE ACCESS, 2024, 12 : 157247 - 157259
- [37] Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities SENSORS, 2019, 19 (08):
- [38] Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 216 - 221
- [39] Fault Sensitivity Analysis of Lattice-Based Post-Quantum Cryptographic Components EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2019, 2019, 11733 : 107 - 123
- [40] A New Lattice-Based Signature Scheme in Post-Quantum Blockchain Network IEEE ACCESS, 2019, 7 : 2026 - 2033