共 31 条
[1]
Abdalla M, 2012, LECT NOTES COMPUT SC, V7237, P572, DOI 10.1007/978-3-642-29011-4_34
[2]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[3]
Revisiting TESLA in the Quantum Random Oracle Model
[J].
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017,
2017, 10346
:143-162
[4]
[Anonymous], 2018, ESTIMATE ALL LWE NTR
[5]
[Anonymous], 2009, Post quantum cryptography
[6]
[Anonymous], COMPCON 1982
[7]
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[9]
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
[J].
COMPUTER SECURITY - ESORICS 2015, PT I,
2015, 9326
:305-325
[10]
Benhamouda F, 2014, LECT NOTES COMPUT SC, V8873, P551, DOI 10.1007/978-3-662-45611-8_29