共 14 条
- [1] Baldi M, 2008, LECT NOTES COMPUT SC, V5229, P246, DOI 10.1007/978-3-540-85855-3_17
- [2] Couvreur A., 2018, ARXIV PREPRINT ARXIV
- [3] Couvreur A, 2014, IEEE INT SYMP INFO, P1446, DOI 10.1109/ISIT.2014.6875072
- [4] Couvreur A, 2014, LECT NOTES COMPUT SC, V8441, P17, DOI 10.1007/978-3-642-55220-5_2
- [5] Applying Grover's Algorithm to AES: Quantum Resource Estimates [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 29 - 43
- [6] Janwa H., 1996, Designs, Codes and Cryptography, V8, P293, DOI 10.1023/A:1027351723034
- [7] Kepley S, 2015, QUANTUM INF PROCESS, V14, P2373, DOI 10.1007/s11128-015-0993-1
- [8] McEliece RJ., 1978, Deep Space Netw. Prog. Rep, V42, P114
- [9] Misoczki R, 2013, IEEE INT SYMP INFO, P2069, DOI 10.1109/ISIT.2013.6620590
- [10] Peters C, 2010, LECT NOTES COMPUT SC, V6061, P81, DOI 10.1007/978-3-642-12929-2_7