Post Quantum Secure Command and Control of Mobile Agents Inserting quantum-resistant encryption schemes in the Secure Robot Operating System
暂无分享,去创建一个
[1] Oded Regev,et al. The Learning with Errors Problem (Invited Survey) , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.
[2] Daniel Apon,et al. Status report on the first round of the NIST post-quantum cryptography standardization process , 2019 .
[3] Dimitrios Sikeridis,et al. Two PQ Signature Use-cases: Non-issues, challenges and potential solutions , 2019, IACR Cryptol. ePrint Arch..
[4] Micael S. Couceiro,et al. On the Security of Robotic Applications Using ROS , 2018, Artificial Intelligence Safety and Security.
[5] Peter Schartner,et al. Secure communication for the robot operating system , 2017, 2017 Annual IEEE International Systems Conference (SysCon).
[6] Frederik Vercauteren,et al. Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM , 2018, IACR Cryptol. ePrint Arch..
[7] Agostino Cortesi,et al. Penetration Testing ROS , 2019, Studies in Computational Intelligence.
[8] Audun Jøsang,et al. The Impact of Quantum Computing on Present Cryptography , 2018, ArXiv.
[9] Daniele Micciancio. Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.
[10] Stefanie Tellex,et al. Scanning the Internet for ROS: A View of Security in Robotics Research , 2018, 2019 International Conference on Robotics and Automation (ICRA).
[11] Douglas Stebila,et al. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project , 2016, SAC.
[12] Miklós Ajtai,et al. Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..
[13] Henrik I. Christensen,et al. SROS: Securing ROS over the wire, in the graph, and through the kernel , 2016, ArXiv.
[14] Peter Schartner,et al. Application-level security for ROS-based applications , 2016, 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[15] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[16] Ishaani Priyadarshini,et al. Cyber Security Risks in Robotics , 2017 .
[17] Cynthia Dwork,et al. A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.
[18] Angela Orebaugh,et al. Guide to IPsec VPNs , 2005 .
[19] María Naya-Plasencia,et al. Quantum Security Analysis of AES , 2019, IACR Cryptol. ePrint Arch..
[20] William Whyte,et al. Practical Lattice-Based Cryptography: NTRUEncrypt and NTRUSign , 2010, The LLL Algorithm.
[21] Bernhard Dieber,et al. Security Considerations in Modular Mobile Manipulation , 2019, 2019 Third IEEE International Conference on Robotic Computing (IRC).
[22] O. Regev. The Learning with Errors problem , 2010 .
[23] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[24] Carl Pomerance,et al. A Tale of Two Sieves , 1998 .