Author:
Boyd Colin,de Kock Bor,Millerjord Lise
Publisher
Springer Nature Switzerland
Reference26 articles.
1. Alagic, G., et al.: Status report on the third round of the NIST post-quantum cryptography standardization process. Technical report, National Institute of Standards and Technology (2022). https://csrc.nist.gov/publications/detail/nistir/8413/final
2. Angel, Y., Dowling, B., Hülsing, A., Schwabe, P., Weber, F.: Post quantum noise. Cryptology ePrint Archive, Report 2022/539 (2022). https://eprint.iacr.org/2022/539
3. Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract). In: 30th ACM STOC, pp. 419–428. ACM Press (1998)
4. Lecture Notes in Computer Science;F Bergsma,2015
5. Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188–194 (2017)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献