On the post-quantum security of encrypted key exchange protocols
暂无分享,去创建一个
[1] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[3] Biyao Yang,et al. Full Quantum Treatment of Rabi Oscillation Driven by a Pulse Train and Its Application in Ion-Trap Quantum Computation , 2010, IEEE Journal of Quantum Electronics.
[4] J. Cirac,et al. Quantum Computations with Cold Trapped Ions. , 1995, Physical review letters.
[5] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] Richard Cleve,et al. Fast parallel circuits for the quantum Fourier transform , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.
[8] Thierry Paul,et al. Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.
[9] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[10] Li Yang,et al. Qubit-string-based bit commitment protocols with physical security , 2010, 1011.5099.
[11] Peter W. Shor,et al. Fault-tolerant quantum computation , 1996, Proceedings of 37th Conference on Foundations of Computer Science.
[12] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[13] David P. Jablon. Extended password key exchange protocols immune to dictionary attack , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[14] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[15] Peter W. Shor. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .
[16] Gene Tsudik,et al. Refinement and extension of encrypted key exchange , 1995, OPSR.
[17] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .