Author:
Chen Jiahui,Ling Jie,Ning Jianting,Peng Zhiniang,Tan Yang
Publisher
Springer International Publishing
Reference14 articles.
1. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)
2. Bernstein, D.J.: Introduction to post-quantum cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-quantum cryptography - PQCrypto 2009, LNCS, pp. 1–14. Springer, Heidelberg (2009).
https://doi.org/10.1007/978-3-540-88702-7_1
3. NIST CSRC: Cryptographic technology group: submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016)
4. Tang, S., Xu, L.: Towards provably secure proxy signature scheme based on isomorphisms of polynomials. Future Gener. Comput. Syst. 30, 91–97 (2014)
5. Petzoldt, A., Bulygin, S., Buchmann, J.: A multivariate based threshold ring signature scheme. Appl. Algebra Eng. Commun. Comput. 24(3–4), 255–275 (2013)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献