共 37 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]
Al-Riyami SS, 2005, LECT NOTES COMPUT SC, V3386, P398
[3]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]
[Anonymous], 2013193 IACR
[5]
[Anonymous], INTRO POSTQUANTUM CR
[6]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[7]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[8]
Ducas L, 2014, LECT NOTES COMPUT SC, V8874, P22, DOI 10.1007/978-3-662-45608-8_2
[9]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[10]
Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112