共 30 条
[1]
Alkim E., 2016, 6 SEC PRIV ADV CRYPT, P332, DOI [10.1007/978-3-319-49445-6_19, DOI 10.1007/978-3-319-49445-6_19]
[2]
Bernstein D.J., 2015, TWEETABLE FIPS, V202
[3]
Bertoni G., 2011, KECCAK SPECIFICATION
[4]
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
[J].
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018),
2018,
:353-367
[5]
Botros L, 2019, LECT NOTES COMPUT SC, V11627, P209, DOI 10.1007/978-3-030-23696-0_11
[6]
Brakerski Z, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P575
[7]
Implementing and Benchmarking Three Lattice-based Post-Quantum Cryptography Algorithms Using Software/Hardware Codesign
[J].
2019 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT 2019),
2019,
:206-214
[8]
Dworkin MJ, 2015, Federal Information ProcessingStandards, DOI DOI 10.6028/NIST.FIPS.202
[9]
Ferozpuri A, 2018, PROC INT CONF RECON