共 10 条
- [1] Implementation of Lattice Trapdoors on Modules and Applications [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 195 - 214
- [2] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
- [4] Securely outsourcing the ciphertext-policy attribute-based encryption [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
- [5] Approx-SVP in Ideal Lattices with Pre-processing [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 685 - 716
- [7] Yongtao Wang, 2014, International Journal of Network Security, V16, P444
- [8] Zhang J, 2012, 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012)
- [9] Zhang YH, 2014, LECT NOTES COMPUT SC, V8782, P259, DOI 10.1007/978-3-319-12475-9_18
- [10] Zhao Siyu, 2020, IEEE Transactions on Services Computing