共 39 条
[1]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]
[Anonymous], 2013, IACR CRYPTOL EPRINT
[4]
Bernstein D.J, 2009, Post-Quantum Cryptography, DOI [DOI 10.1007/978-3-540-88702-7, 10.1007/978-3-540-88702-7, DOI 10.1007/978-3-540-88702-71]
[5]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[6]
Ducas L, 2014, LECT NOTES COMPUT SC, V8874, P22, DOI 10.1007/978-3-662-45608-8_2
[10]
Gentry C, 2003, LECT NOTES COMPUT SC, V2656, P272