Author:
Bernstein Daniel J.,Hülsing Andreas
Publisher
Springer International Publishing
Reference16 articles.
1. Andreeva, E., Bouillaguet, C., Dunkelman, O., Fouque, P.-A., Hoch, J.J., Kelsey, J., Shamir, A., Zimmer, S.: New second-preimage attacks on hash functions. J. Cryptol. 29(4), 657–696 (2016).
https://www.di.ens.fr/~fouque/pub/joc11.pdf
2. Lecture Notes in Computer Science;J Buchmann,2007
3. Charalambides, C.A.: Distributions of random partitions and their applications. Methodol. Comput. Appl. Probab. 9(2), 163–193 (2007)
4. Dörrie, H.: 100 Great Problems of Elementary Mathematics. Courier Corporation (2013)
5. Flajolet, P., Sedgewick, R.: Analytic Combinatorics. Cambridge University Press, Cambridge (2009).
http://ac.cs.princeton.edu/home/AC.pdf
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hypericum: a post-quantum digital signature for standardization in Russia;Journal of Computer Virology and Hacking Techniques;2024-05-25
2. Bit Security as Cost to Demonstrate Advantage;IACR Communications in Cryptology;2024-04-09
3. FIPS Compliant Quantum Secure Communication Using Quantum Permutation Pad;2023 6th World Symposium on Communication Engineering (WSCE);2023-09-27
4. Recovering the Tight Security Proof of SPHINCS$$^+$$;Advances in Cryptology – ASIACRYPT 2022;2022
5. An Area-Efficient SPHINCS+ Post-Quantum Signature Coprocessor;2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW);2021-06