Author:
Zhu Yiming,Liu Zhen,Pan Yanbin
Publisher
Springer International Publishing
Reference25 articles.
1. Lecture Notes in Computer Science;E Alkım,2019
2. Bernstein, D.J.: Multidigit multiplication for mathematicians (2001). http://cr.yp.to/papers.html#m3
3. Bos, J.W., Costello, C., Naehrig, M., Stebila, D.: Post-quantum key exchange for the TLS protocol from the ring learning with errors problem. In: 2015 IEEE Symposium on Security and Privacy, pp. 553–570. IEEE (2015)
4. Bos, J., et al.: CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: IEEE European Symposium on Security and Privacy, pp. 353–367. IEEE (2018)
5. Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. In: Innovations in Theoretical Computer Science, pp. 309–325 (2012)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献