共 50 条
- [1] Attacking and defending masked polynomial comparison for lattice-based cryptography IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (03): : 334 - 359
- [2] Attacking Compressed Vision Transformers ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 743 - 758
- [3] Decepticon: Attacking Secrets of Transformers 2023 IEEE INTERNATIONAL SYMPOSIUM ON WORKLOAD CHARACTERIZATION, IISWC, 2023, : 128 - 139
- [4] Security of quantum cryptography against Trojan horse attacking Ruan Jian Xue Bao, 1600, 8 (1259-1264):
- [5] Lattice Cryptography for the Internet POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 197 - 219
- [7] Λολ: Functional Lattice Cryptography CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 993 - 1005
- [8] A Decade of Lattice Cryptography FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2014, 10 (04): : 283 - 424
- [9] Lattice-based cryptography ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141
- [10] Lattice-based Cryptography 2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467