共 25 条
[11]
Buchmann J, 2011, LECT NOTES COMPUT SC, V7071, P117, DOI 10.1007/978-3-642-25405-5_8
[12]
Buchmann J, 2008, LECT NOTES COMPUT SC, V5299, P63, DOI 10.1007/978-3-540-88403-3_5
[13]
Dahmen E, 2008, LECT NOTES COMPUT SC, V5299, P109, DOI 10.1007/978-3-540-88403-3_8
[14]
Eisenbarth T, 2014, LECT NOTES COMPUT SC, V8282, P223
[15]
GOLDREICH O, 1987, LECT NOTES COMPUT SC, V263, P104
[16]
Güneysu T, 2012, LECT NOTES COMPUT SC, V7428, P530, DOI 10.1007/978-3-642-33027-8_31
[17]
Hlsing A., 2013, Security Engineering and Intelligence Informatics, VVolume 8128, P194, DOI DOI 10.1007/978-3-642-40588-414
[18]
Hulsing Andreas, 2013, Progress in Cryptology - AFRICACRYPT 2013. 6th International Conference on Crytology in Africa. Proceedings, P173, DOI 10.1007/978-3-642-38553-7_10
[19]
Hulsing A., 2013, THESIS
[20]
Hulsing A., 2015, XMSS EXTEND IN PRESS