共 96 条
- [1] Shannon C.E., Communication theory of secrecy systems, Bell Syst. Techn. J., 28, 4, pp. 656-715, (1949)
- [2] Kaltz J., Lindell Y., Introduction to Modern Cryptography: Principles and Protocols, (2008)
- [3] McEliece R.J., A public-key cryptosystem based on algebraic coding theory, Coding Thv, 4244, pp. 114-116, (1978)
- [4] Bernstein D.J., Lange T., Peters C., Attacking and defending the mcEliece cryptosystem, Proc. Int. Workshop Post-Quantum Cryptogr., pp. 31-46, (2008)
- [5] El Rouayheb S.Y., Soljanin E., On wiretap networks II, Proc. IEEE Int. Symp. Inf. Theory (ISIT), pp. 551-555, (2007)
- [6] Cohen A., Cohen A., Medard M., Gurewitz O., Secure multisource multicast, IEEE Trans. Commun., 67, 1, pp. 708-723, (2019)
- [7] Rivest R.L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, 21, 2, pp. 120-126, (1978)
- [8] Shor P.W., Algorithms for quantum computation: Discrete logarithms and factoring, Proc. 35th Annu. Symp. Found. Comput. Sci., pp. 124-134, (1994)
- [9] Hallgren S., Fast quantum algorithms for computing the unit group and class group of a number field, Proc. 37th Annu. ACM Symp. Theory Comput., pp. 468-474, (2005)
- [10] Hallgren S., Polynomial-time quantum algorithms for Pell’s equation and the principal ideal problem, J. ACM, 54, 1, pp. 1-19, (2007)