共 18 条
[1]
[Anonymous], IACR CRYPTOLOGY EPRI
[2]
[Anonymous], PARI GP VERS 2 7 5
[3]
[Anonymous], 2006, CHIN ACAD AGR SCI, DOI DOI 10.7666/D.Y1057240
[4]
[Anonymous], NIST SPECIAL PUBLI 1
[5]
[Anonymous], IACR CRYPTOLOGY EPRI
[6]
Boneh D., 2013, Applied Cryptography and Network Security (ACNS)
[7]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[8]
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[9]
Provably Weak Instances of Ring-LWE Revisited
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I,
2016, 9665
:147-167