共 18 条
[1]
Avanzi R., 2020, CRYSTALSNIST PQC Round 3
[3]
Ender M, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1803
[4]
ETSI/SAGE, 2006, Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2
[5]
Grover L. K., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P212, DOI 10.1145/237814.237866
[6]
Extract LUT Logics from a Downloaded Bitstream Data in FPGA
[J].
2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS),
2018,
[7]
Physical Protection of Lattice-Based Cryptography - Challenges and Solutions -
[J].
PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18),
2018,
:365-370
[8]
Moody D., 2016, PQCRYPTO 16 C
[9]
Moraitis M, 2020, DES AUT TEST EUROPE, P1275, DOI 10.23919/DATE48585.2020.9116222