共 33 条
- [1] Aikata Aikata, Mert Ahmet Can, Imran Malik, Pagliarini Samuel, Roy Sujoy Sinha, Kali: A crystal for post-quantum security using kyber and dilithium, IEEE Transactions on Circuits and Systems I: Regular Papers, 70, 2, pp. 747-758, (2022)
- [2] Barrett Paul, Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor, Conference on the Theory and Application of Cryptographic Techniques, pp. 311-323, (1986)
- [3] Bos Joppe, Ducas Leo, Kiltz Eike, Lepoint Tancrede, Lyubashevsky Vadim, Schanck John M, Schwabe Peter, Seiler Gregor, Stehle Damien, Crystals-kyber: a cca-secure module-lattice-based kem, 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 353-367, (2018)
- [4] Bertoni Guido, Daemen Joan, Peeters Michael, Van Assche Gilles, Keccak, Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 313-314, (2013)
- [5] Bisheh-Niasar Mojtaba, Azarderakhsh Reza, Mozaffari-Kermani Mehran, A monolithic hardware implementation of kyber: Comparing apples to apples in pqc candidates, Progress in Cryptology–LATINCRYPT 2021: 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings 7, pp. 108-126
- [6] Bellare Mihir, Rogaway Phillip, The exact security of digital signatures-how to sign with rsa and rabin, International conference on the theory and applications of cryptographic techniques, pp. 399-416, (1996)
- [7] Banerjee Utsav, Ukyab Tenzin S, Chandrakasan Anantha P, Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols, (2019)
- [8] Chen Donald Donglong, Mentens Nele, Vercauteren Frederik, Roy Sujoy Sinha, Cheung R. C. C., Pao Derek, Verbauwhede Ingrid, High-speed polynomial multiplication architecture for ring-LWE and SHE cryptosystems, IEEE Transactions on Circuits and Systems I: Regular Papers, 62, 1, pp. 157-166, (2014)
- [9] Chang Shu-jen, Perlner Ray, Burr William E, Turan Meltem Sonmez, Kelsey John M, Paul Souradyuti, Bassham Lawrence E, Third-round report of the sha-3 cryptographic hash algorithm competition, NIST Interagency Report, 7896, (2012)
- [10] Cooley James W, Tukey John W, An algorithm for the machine calculation of complex fourier series, Mathematics of computation, 19, 90, pp. 297-301, (1965)