Man in the Middle Attack on NTRU Key Exchange
暂无分享,去创建一个
[1] Ueli Maurer,et al. Unifying Zero-Knowledge Proofs of Knowledge , 2009, AFRICACRYPT.
[2] Michael Naehrig,et al. Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.
[3] William Whyte,et al. Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign , 2010, The LLL Algorithm.
[4] J. Hoffstein,et al. An introduction to mathematical cryptography , 2008 .
[5] Xiaofeng Liao,et al. NTRU-KE: A Lattice-based Public Key Exchange Protocol , 2013, IACR Cryptol. ePrint Arch..
[6] M. K. Ibrahem. Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof , 2012, 2012 International Conference on Future Communication Networks.
[7] Shafi Goldwasser,et al. Complexity of lattice problems - a cryptographic perspective , 2002, The Kluwer international series in engineering and computer science.
[8] Jean-Pierre Seifert,et al. Approximating Shortest Lattice Vectors is Not Harder Than Approximating Closest Lattice Vectors , 1999, Electron. Colloquium Comput. Complex..
[9] Craig Costello,et al. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem , 2015, 2015 IEEE Symposium on Security and Privacy.