共 40 条
[1]
Open-Source FPGA Implementation of Post-Quantum Cryptographic Hardware Primitives
[J].
2019 29TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL),
2019,
:211-217
[2]
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[3]
Aysu A, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P81, DOI 10.1109/HST.2013.6581570
[4]
Banerjee U., 2019, IACR T CRYPTOGRAPHIC, V2019, P17
[5]
BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
[6]
Basu K., 2019, IACR Cryptol. ePrint Arch, V2019, P47
[7]
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
[J].
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018),
2018,
:353-367
[8]
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1006-1018
[9]
Bosselaers A., 1994, Advances in Cryptology CRYPTO93, P175, DOI DOI 10.1007/3-540-48329-2_16
[10]
Botros L, 2019, LECT NOTES COMPUT SC, V11627, P209, DOI 10.1007/978-3-030-23696-0_11