共 28 条
[1]
Abdalla M, 2007, LECT NOTES COMPUT SC, V4392, P499
[2]
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[3]
[Anonymous], 2001, ACM CCS 01 NOV, DOI DOI 10.1145/634067.6342922
[4]
Constant-Round Group Key Exchange from the Ring-LWE Assumption
[J].
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019,
2019, 11505
:189-205
[5]
Aragon N, 2017, BIKE BIT FLIPPING KE
[6]
Azarderakhsh R., 2017, SIKE SUPERSINGULAR I
[7]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[8]
Hash Proof Systems over Lattices Revisited
[J].
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II,
2018, 10770
:644-674
[9]
Bernstein D., 2017, Classic mceliece
[10]
NTRU Prime: Reducing Attack Surface at Low Cost
[J].
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017,
2018, 10719
:235-260