Superposition Attacks on Cryptographic Protocols
暂无分享,去创建一个
Ivan Damgård | Louis Salvail | Jesper Buus Nielsen | Jakob Funder | I. Damgård | J. Nielsen | L. Salvail | Jakob Funder
[1] Serge Fehr,et al. Composing Quantum Protocols in a Classical Environment , 2009, TCC.
[2] Ivan Damgård,et al. Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks , 2004, CRYPTO.
[3] Mark Zhandry,et al. Secure Identity-Based Encryption in the Quantum Random Oracle Model , 2012, CRYPTO.
[4] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[5] John Watrous,et al. Zero-knowledge against quantum attacks , 2005, STOC '06.
[6] Moni Naor,et al. Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.
[7] A. Winter,et al. ON THE EXISTENCE OF PHYSICAL TRANSFORMATIONS BETWEEN SETS OF QUANTUM STATES , 2003, quant-ph/0307227.
[8] Avinatan Hassidim,et al. Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[9] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[10] Moni Naor,et al. Games for exchanging information , 2008, STOC.
[11] Mark Zhandry,et al. Random Oracles in a Quantum World , 2010, ASIACRYPT.
[12] Mark Zhandry,et al. How to Construct Quantum Random Functions , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[13] Rafail Ostrovsky,et al. Zero-Knowledge Proofs from Secure Multiparty Computation , 2009, SIAM J. Comput..
[14] Mark Zhandry,et al. Quantum-Secure Message Authentication Codes , 2013, IACR Cryptol. ePrint Arch..