共 74 条
[1]
Ajtai M., 1997, P 29 ANN ACM S THEOR, P284, DOI DOI 10.1145/258533.258604
[2]
A Subfield Lattice Attack on Overstretched NTRU Assumptions Cryptanalysis of Some FHE and Graded Encoding Schemes
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I,
2016, 9814
:153-178
[3]
More on average case vs approximation complexity
[J].
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
2003,
:298-307
[4]
Alkim E., 2016, IACR CRYPTOLOGY EPRI, V2016, P1157
[5]
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[6]
[Anonymous], 20161126 IACR CRYPT
[7]
[Anonymous], ebacs: Ecrypt benchmarking of cryptographic systems
[8]
[Anonymous], 2015, Search problems in cryptography
[9]
Applebaum B, 2009, LECT NOTES COMPUT SC, V5677, P595, DOI 10.1007/978-3-642-03356-8_35
[10]
Aumasson Jean-Philippe, 2016, BLAKE2X