共 33 条
[1]
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[2]
Alperin-Sheriff J., 2016, IACR Cryptol. ePrint Arch., V2016, P589
[3]
Alwen J, 2013, LECT NOTES COMPUT SC, V8042, P57, DOI 10.1007/978-3-642-40041-4_4
[4]
[Anonymous], 2015, 2015 25 INT C FIELD
[5]
Arora S, 2011, LECT NOTES COMPUT SC, V6755, P403, DOI 10.1007/978-3-642-22006-7_34
[6]
Round5: Compact and Fast Post-quantum Public-Key Encryption
[J].
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019,
2019, 11505
:83-102
[7]
Improved Security Proofs in Lattice-Based Cryptography: Using the Renyi Divergence Rather Than the Statistical Distance
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I,
2015, 9452
:3-24
[8]
Banerjee A., 2011, IACR CRYPTOLOGY EPRI, V2011, P401
[9]
Banerjee A, 2012, LECT NOTES COMPUT SC, V7237, P719, DOI 10.1007/978-3-642-29011-4_42
[10]
On the Hardness of Learning with Rounding over Small Modulus
[J].
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I,
2016, 9562
:209-224