Securing the Internet of Things in a Quantum World
暂无分享,去创建一个
Rongxing Lu | Tsuyoshi Takagi | Chi Cheng | Albrecht Petzoldt | Rongxing Lu | Albrecht Petzoldt | T. Takagi | Chi Cheng
[1] Joppe W. Bos,et al. Initial recommendations of long-term secure post-quantum systems , 2015 .
[2] Peter Schwabe,et al. SPHINCS: Practical Stateless Hash-Based Signatures , 2015, EUROCRYPT.
[3] Chris Peikert,et al. A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..
[4] Albrecht Petzoldt,et al. Post-Quantum Cryptography: State of the Art , 2017, The New Codebreakers.
[5] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[6] Tim Güneysu,et al. High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers , 2015, LATINCRYPT.
[7] Johannes A. Buchmann,et al. XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions , 2011, IACR Cryptol. ePrint Arch..
[8] Craig Costello,et al. Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem , 2015, 2015 IEEE Symposium on Security and Privacy.
[9] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[10] T. Monz,et al. Realization of a scalable Shor algorithm , 2015, Science.
[11] Stefan Heyse,et al. Efficient Implementations of MQPKS on Constrained Devices , 2012, CHES.
[12] Daniel Smith-Tone,et al. Report on Post-Quantum Cryptography , 2016 .
[13] Tim Güneysu,et al. Beyond ECDSA and RSA: Lattice-based digital signatures on constrained devices , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[14] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[15] Chiara Petrioli,et al. Security as a CoAP resource: An optimized DTLS implementation for the IoT , 2015, 2015 IEEE International Conference on Communications (ICC).