共 60 条
[1]
Alagic G., 2020, Status report on the second round of the nist post-quantum cryptography standardization process, DOI [DOI 10.6028/NIST.IR.8309, 10.6028/NIST.IR.8309]
[2]
Alagic G., 2019, Status report on the first round of the nist post-quantum cryptography standardization process, DOI [10.6028/NIST.IR.8240, DOI 10.6028/NIST.IR.8240]
[3]
Jasmin: High-Assurance and High-Speed Cryptography
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1807-1823
[4]
Almeida JB, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P53
[5]
Anderson Ross, 1993, P 1 ACM C COMP COMM, P215, DOI DOI 10.1145/168588.168615
[6]
[Anonymous], 2018, EBACS ECRYPT BENCHMA
[7]
[Anonymous], 2017, Criteria for the Post-Quantum Cryptography Standardization Process
[8]
SoK: Computer-Aided Cryptography
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:777-795
[9]
Bernstein DJ, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P845