共 40 条
[11]
[Anonymous], 2011, ENCY CRYPTOGRAPHY SE, DOI DOI 10.1007/9781-4419-5906-5_125
[12]
Bellare M., 1993, P ANN INT CRYPT C, P232, DOI DOI 10.1007/3-540-48329-2_21
[13]
Bellare Mihir., 1998, STOC, P419
[14]
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[15]
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1006-1018
[16]
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
[J].
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015,
2015,
:553-570
[17]
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[19]
Choo KKR, 2005, LECT NOTES COMPUT SC, V3788, P585
[20]
Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45