共 25 条
- [11] Buchmann J, 2011, LECT NOTES COMPUT SC, V7071, P117, DOI 10.1007/978-3-642-25405-5_8
- [12] Buchmann J, 2008, LECT NOTES COMPUT SC, V5299, P63, DOI 10.1007/978-3-540-88403-3_5
- [13] Dahmen E, 2008, LECT NOTES COMPUT SC, V5299, P109, DOI 10.1007/978-3-540-88403-3_8
- [14] Eisenbarth T, 2014, LECT NOTES COMPUT SC, V8282, P223
- [15] GOLDREICH O, 1987, LECT NOTES COMPUT SC, V263, P104
- [16] Güneysu T, 2012, LECT NOTES COMPUT SC, V7428, P530, DOI 10.1007/978-3-642-33027-8_31
- [17] Hlsing A., 2013, Security Engineering and Intelligence Informatics, VVolume 8128, P194, DOI DOI 10.1007/978-3-642-40588-414
- [18] Hulsing Andreas, 2013, Progress in Cryptology - AFRICACRYPT 2013. 6th International Conference on Crytology in Africa. Proceedings, P173, DOI 10.1007/978-3-642-38553-7_10
- [19] Hulsing A., 2013, THESIS
- [20] Hulsing A., 2015, XMSS EXTEND IN PRESS