相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices
Vivek Dabra et al.
IEEE SYSTEMS JOURNAL (2021)
Provably secure two-party authenticated key agreement protocol for post-quantum environments
S. K. Hafizul Islam
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices
Qi Feng et al.
IEEE SYSTEMS JOURNAL (2019)
Post-Quantum Lattice-Based Cryptography Implementations: A Survey
Hamid Nejatollahi et al.
ACM COMPUTING SURVEYS (2019)
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope
Yue Qin et al.
COMPUTER SECURITY - ESORICS 2019, PT II (2019)
Post-Quantum Key Exchange on ARMv8-A: A New Hope for NEON Made Simple
Silvan Streit et al.
IEEE TRANSACTIONS ON COMPUTERS (2018)
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols
Nina Bindel et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2018)
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
Joppe Bos et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Joppe W. Bos et al.
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)
Authenticated Key Exchange from Ideal Lattices
Jiang Zhang et al.
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II (2015)
On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
Oded Regev
JOURNAL OF THE ACM (2009)