共 33 条
[11]
Brakerski Z, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P575
[12]
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
[J].
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016,
2016, 9813
:323-345
[14]
Provably Weak Instances of Ring-LWE Revisited
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I,
2016, 9665
:147-167
[15]
D'Anvers Jan-Pieter, 2018, Progress in Cryptology - AFRICACRYPT 2018. 10th International Conference on Cryptology in Africa. Proceedings: LNCS 10831, P282, DOI 10.1007/978-3-319-89339-6_16
[16]
Ding Jintai., 2012, IACR Cryptology ePrint Archive, V2012, P688
[17]
Kaltofen E., 1996, ISSAC, V96, P241
[19]
Long Chen, 2018, Advances in Cryptology - ASIACRYPT 2018. 24th International Conference on the Theory and Application of Cryptology and Information Security. Proceedings: Lecture Notes in Computer Science (LNCS 11272), P435, DOI 10.1007/978-3-030-03326-2_15