共 39 条
[1]
Abdalla M, 2012, LECT NOTES COMPUT SC, V7237, P572, DOI 10.1007/978-3-642-29011-4_34
[2]
Alagic G., 2020, Status report on the second round of the NIST post-quantum cryptography standardization process, DOI DOI 10.6028/NIST.IR.8309
[3]
Quantum-Access-Secure Message Authentication via Blind-Unforgeability
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III,
2020, 12107
:788-817
[4]
Efficient Simulation of Random States and Random Unitaries
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III,
2020, 12107
:759-787
[5]
Quantum Security Proofs Using Semi-classical Oracles
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II,
2019, 11693
:269-295
[6]
Security of Hedged Fiat-Shamir Signatures Under Fault Attacks
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I,
2020, 12105
:644-674
[7]
Quantum lower bounds by polynomials
[J].
39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS,
1998,
:352-361
[8]
Tighter Proofs of CCA Security in the Quantum Random Oracle Model
[J].
THEORY OF CRYPTOGRAPHY, TCC 2019, PT II,
2019, 11892
:61-90
[9]
Random Oracles in a Quantum World
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011,
2011, 7073
:41-+
[10]
Bos J.W., 2020, CRYPTOLOGY EPRINT AR