Author:
Xagawa Keita,Ito Akira,Ueno Rei,Takahashi Junko,Homma Naofumi
Publisher
Springer International Publishing
Reference81 articles.
1. ISO/IEC 18033-2:2006 information technology – security techniques – encryption algorithms – part 2: asymmetric ciphers (2006). https://www.iso.org/standard/37971.html
2. Lecture Notes in Computer Science;M Abdalla,2015
3. Lecture Notes in Computer Science;D Aggarwal,2009
4. Aguilar Melchor, C., et al.: HQC. Technical report, National Institute of Standards and Technology (2020)
5. Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average-case equivalence. In: STOC 1997, pp. 284–293. ACM Press, May 1997
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献