Securing M2M With Post-Quantum Public-Key Cryptography
暂无分享,去创建一个
Wen-Chung Shen | An-Yeu Wu | Chen-Mou Cheng | Jie-Ren Shih | Bo-Yin Yang | Ming-Shing Chen | Yongbo Hu | Ming-Chun Hsiao | A. Wu | Bo-Yin Yang | Wen-Chung Shen | Chen-Mou Cheng | Yongbo Hu | Ming-Shing Chen | Ming-Chun Hsiao | Jie-Ren Shih
[1] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[2] Bo-Yin Yang,et al. TTS: High-Speed Signatures on a Low-Cost Smart Card , 2004, CHES.
[3] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[4] Bo-Yin Yang,et al. Multivariate Public Key Cryptography , 2009 .
[5] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[6] Jintai Ding,et al. Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.
[7] Chen-Mou Cheng,et al. SSE Implementation of Multivariate PKCs on Modern x86 CPUs , 2009, CHES.
[8] Rishiyur S. Nikhil,et al. Bluespec System Verilog: efficient, correct RTL from high level specifications , 2004, Proceedings. Second ACM and IEEE International Conference on Formal Methods and Models for Co-Design, 2004. MEMOCODE '04..
[9] Rachid Beghdad,et al. Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.
[10] Jintai Ding,et al. High-Speed Hardware Implementation of Rainbow Signature on FPGAs , 2011, PQCrypto.
[11] Andrey Bogdanov,et al. Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves? , 2008, IACR Cryptol. ePrint Arch..
[12] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[13] Michael D. Smith,et al. Implementing public-key infrastructure for sensor networks , 2008, TOSN.
[14] Andrey Bogdanov,et al. Fast multivariate signature generation in hardware: The case of rainbow , 2008, 2008 International Conference on Application-Specific Systems, Architectures and Processors.
[15] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[16] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[17] Jun Rim Choi,et al. Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm , 2001, ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196).
[18] Colleen Marie O'Rourke. Efficient NTRU Implementations , 2002 .
[19] Ingrid Verbauwhede,et al. Low-cost implementations of NTRU for pervasive security , 2008, 2008 International Conference on Application-Specific Systems, Architectures and Processors.
[20] Joseph H. Silverman,et al. NTRU in Constrained Devices , 2001, CHES.
[21] Chen-Mou Cheng,et al. Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.
[22] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..