共 25 条
- [1] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
- [2] Revisiting TESLA in the Quantum Random Oracle Model [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 143 - 162
- [3] Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
- [4] [Anonymous], ADV CRYPTOLOGY CRYPT
- [5] [Anonymous], 2014874 IACR CRYPT E
- [6] [Anonymous], 2017, Paper 2017/633
- [7] [Anonymous], 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180453
- [8] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
- [9] Chen L., 2015, 8105 NISTIR US DEP C
- [10] Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3