Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project
暂无分享,去创建一个
Zhen Liu | Yanbin Pan | Tianyuan Xie | Z. Liu | Tianyuan Xie | Yanbin Pan
[1] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[2] Eike Kiltz,et al. A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.
[3] Paulo S. L. M. Barreto,et al. MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes , 2013, 2013 IEEE International Symposium on Information Theory.
[4] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[5] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[6] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[7] Daniel Smith-Tone,et al. Report on Post-Quantum Cryptography , 2016 .
[8] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[9] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[10] Shu Lin,et al. Error Control Coding , 2004 .