Post-Quantum Signcryption From Lattice-Based Signatures
暂无分享,去创建一个
[1] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[2] Yuliang Zheng,et al. Practical Signcryption , 2010, Information Security and Cryptography.
[3] Tim Güneysu,et al. High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers , 2015, LATINCRYPT.
[4] John Malone-Lee,et al. Signcryption with Non-interactive Non-repudiation , 2005, Des. Codes Cryptogr..
[5] Frederik Vercauteren,et al. Efficient software implementation of ring-LWE encryption , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[6] Tim Güneysu,et al. Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems , 2012, CHES.
[7] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[8] Erdem Alkim,et al. NewHope without reconciliation , 2016, IACR Cryptol. ePrint Arch..
[9] Wenbin Yao,et al. Efficient Lattice-Based Signcryption in Standard Model , 2013 .
[10] Zhe Liu,et al. Efficient Ring-LWE Encryption on 8-Bit AVR Processors , 2015, CHES.
[11] Jintai Ding,et al. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..
[12] Erdem Alkim,et al. Revisiting TESLA in the Quantum Random Oracle Model , 2017, PQCrypto.
[13] Shi Bai,et al. An Improved Compression Technique for Signatures Based on Learning with Errors , 2014, CT-RSA.
[14] Qiaoyan Wen,et al. A lattice-based signcryption scheme without random oracles , 2014, Frontiers of Computer Science.
[15] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[16] Peter Schwabe,et al. Software Speed Records for Lattice-Based Signatures , 2013, PQCrypto.
[17] Yupu Hu,et al. Post-Quantum Secure Hybrid Signcryption from Lattice Assumption , 2012 .
[18] Vadim Lyubashevsky,et al. Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..
[19] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[20] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[21] Chris Peikert,et al. Lattice Cryptography for the Internet , 2014, PQCrypto.
[22] Léo Ducas,et al. Lattice Signatures and Bimodal Gaussians , 2013, IACR Cryptol. ePrint Arch..
[23] Damien Stehlé,et al. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM , 2017, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[24] Craig Costello,et al. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem , 2015, 2015 IEEE Symposium on Security and Privacy.
[25] Fahad Bin Muhaya,et al. Lattice‐based signcryption , 2013, Concurr. Comput. Pract. Exp..