共 23 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]
[Anonymous], 2010, PRECIOSA PRIVACY ENA
[3]
[Anonymous], 2017, SCMS SECURITY CREDEN
[4]
Barreto P. S. L. M., 2018, IACR CRYPTOL EPRINT, P1247
[5]
NTRU Prime: Reducing Attack Surface at Low Cost
[J].
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017,
2018, 10719
:235-260
[6]
Bissmeyer N, 2013, 2013 10TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS), P9, DOI 10.1109/WONS.2013.6578314
[8]
Calandriello G, 2007, VANET'07: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON VEHICULAR AD HOC NETWORKS, P19
[9]
Chen L, 2016, REPORT POSTQUANTUM C
[10]
Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3