Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract)
暂无分享,去创建一个
[1] D. Coppersmith. An approximate Fourier transform useful in quantum factoring , 2002, quant-ph/0201067.
[2] Charles H. Bennett,et al. Logical reversibility of computation , 1973 .
[3] Umesh V. Vazirani,et al. Quantum complexity theory , 1993, STOC.
[4] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[5] Joos Vandewalle,et al. Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.
[6] Ueli Maurer,et al. Non-interactive Public-Key Cryptography , 1991, EUROCRYPT.
[7] Andrew Chi-Chih Yao,et al. Quantum Circuit Complexity , 1993, FOCS.
[8] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[9] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Daniel R. Simon,et al. On the power of quantum computation , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[12] Gilles Brassard,et al. Strengths and Weaknesses of Quantum Computing , 1997, SIAM J. Comput..