共 51 条
[1]
Alkim Erdem, Ducas Leo, Poppelmann Thomas, Schwabe Peter, Post-Quantum Key Exchange-A New Hope, USENIX Security Symposium, pp. 327-343, (2016)
[2]
Baan Hayo, Bhattacharya Sauvik, Fluhrer Scott, Garcia-Morchon Oscar, Laarhoven Thijs, Rietman Ronald, Saarinen Markku-Juhani O., Tolhuizen Ludo, Zhang Zhenfei, Round5: Compact and fast post-quantum public-key encryption, Cryptology ePrint Archive, (2019)
[3]
Bos Joppe, Costello Craig, Ducas Leo, Mironov Ilya, Naehrig Michael, Nikolaenko Valeria, Raghunathan Ananth, Stebila Douglas, Frodo: Take off the ring! practical, quantum-secure key exchange from LWE, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1006-1018, (2016)
[4]
Bos Joppe W, Costello Craig, Naehrig Michael, Stebila Douglas, Post-quantum key exchange for the TLS protocol from the ring learning with errors problem, Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, (2015)
[5]
Baetu Ciprian, Betul Durak F, Huguenin-Dumittan Lois, Talayhan Abdullah, Vaudenay Serge, Misuse attacks on post-quantum cryptosystems, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 747-776, (2019)
[6]
Bos Joppe, Ducas Leo, Kiltz Eike, Lepoint Tancrede, Lyubashevsky Vadim, Schanck John M., Schwabe Peter, Seiler Gregor, Stehle Damien, Crystals – kyber: a cca-secure module-lattice-based kem, Cryptology ePrint Archive, (2017)
[7]
Bos Joppe, Ducas Leo, Kiltz Eike, Lepoint Tancrede, Lyubashevsky Vadim, Schanck John M, Schwabe Peter, Seiler Gregor, Stehle Damien, Crystals-kyber: a cca-secure module-lattice-based kem, 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 353-367, (2018)
[8]
Bauer Aurelie, Gilbert Henri, Renault Guenael, Rossi Melissa, Assessment of the key-reuse resilience of newhope, Cryptographers’ Track at the RSA Conference, pp. 272-292, (2019)
[9]
Botros Leon, Kannwischer Matthias J., Schwabe Peter, Memory-efficient high-speed implementation of kyber on cortex-m4, Progress in Cryptology-AFRICACRYPT 2019-11th International Conference on Cryptology in Africa, pp. 209-228, (2019)
[10]
Bleichenbacher Daniel, Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs# 1, Annual International Cryptology Conference, pp. 1-12, (1998)