暂无分享,去创建一个
Yunlei Zhao | Yang Wang | Shiyu Shen | Feng He | Zhichuang Liang | Yunlei Zhao | Yang Wang | Zhichuang Liang | Feng He | Shi-ying Shen
[1] Shay Gueron,et al. Speeding up R-LWE Post-quantum Key Exchange , 2016, NordSec.
[2] Morris J. Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[3] Damien Stehlé,et al. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM , 2017, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Christof Paar,et al. Generalizations of the Karatsuba Algorithm for Efficient Implementations , 2006, IACR Cryptol. ePrint Arch..
[5] J. Tukey,et al. An algorithm for the machine calculation of complex Fourier series , 1965 .
[6] Erdem Alkim,et al. Compact and Simple RLWE Based Key Encapsulation Mechanism , 2019, LATINCRYPT.
[7] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[8] Zhengzhong Jin,et al. Optimal Key Consensus in Presence of Noise , 2016, IACR Cryptol. ePrint Arch..
[9] S. Cook,et al. ON THE MINIMUM COMPUTATION TIME OF FUNCTIONS , 1969 .
[10] Damien Stehlé,et al. Worst-case to average-case reductions for module lattices , 2014, Designs, Codes and Cryptography.
[11] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[12] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[13] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[14] Zhen Liu,et al. When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited , 2019, IACR Cryptol. ePrint Arch..
[15] Henri Cohen,et al. A course in computational algebraic number theory , 1993, Graduate texts in mathematics.
[16] Zhengzhong Jin,et al. Generic and Practical Key Establishment from Lattice , 2019, ACNS.
[17] Xianhui Lu,et al. Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE , 2018, IACR Cryptol. ePrint Arch..
[18] Nikil Dutt,et al. Post-quantum Lattice-based Cryptography Implementations: A Survey , 2019 .
[19] Martin Roetteler,et al. Implementing Grover Oracles for Quantum Key Search on AES and LowMC , 2019, IACR Cryptol. ePrint Arch..
[20] Damien Stehlé,et al. CRYSTALS-Kyber Algorithm Specifications And Supporting Documentation , 2017 .
[21] Zhenfeng Zhang,et al. Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes , 2020, IACR Cryptol. ePrint Arch..
[22] Donald E. Knuth,et al. The art of computer programming, volume 3: (2nd ed.) sorting and searching , 1998 .