共 23 条
[1]
Zhao Y., Quantum cryptography in real-life applications: assumptions and security, dissertation Ph.D, (2009)
[2]
Vaudenay S., Secure communications over insecure channels based on short authenticated strings, Advances in cryptology–CRYPTO 2005. CRYPTO 2005. lecture notes in computer science, 3621, (2005)
[3]
Gupta I., Narain L., Veni Madhavan C.E., Cryptological applications of permutation polynomials, Electron Notes Dis Mathemat, 15, (2003)
[4]
Gabidulin E.M., Ourivski A.V., Honary B., Et al., Reducible rank codes and their applications to cryptography, IEEE Trans Inf Theory, 49, 12, pp. 3289-3293, (2003)
[5]
Qadir A.M., Varol N., A review paper on cryptography, 2019 7th International Symposium on Digital Forensics and Security (ISDFS), pp. 1-6, (2019)
[6]
Sharbaf M.S., Quantum cryptography: an emerging technology in network security, 2011 IEEE International Conference on Technologies for Homeland Security (HST), pp. 13-19, (2011)
[7]
Cruz B., Domingo K., Guzman F., Et al., Expanded 128-bit data encryption standard, (2017)
[8]
Rivest R.L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems, Commun ACM, 21, 2, pp. 120-126, (1978)
[9]
Nielsen M.A., Chuang I.L., Quantum computation and quantum information, (2000)
[10]
Glos A., Miszczak J.A., Impact of the malicious input data modification on the efficiency of quantum spatial search, Quantum Inf Process, 18, (2019)