1. Lecture Notes in Computer Science;S Agrawal,2010
2. Lecture Notes in Computer Science;M Ajtai,1999
3. Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: 26th International Symposium on Theoretical Aspects of Computer Science, STACS, Freiburg, Germany, vol. 3, pp. 75–86 (2009)
4. Anderson, R.: Two remarks on public key cryptology. Technical report, Computer Laboratory, University of Cambridge (2002)
5. Baek, J., Vu, Q.H., Shoufan, A., Jones, A., Wong, D.S.: Stateful public-key encryption schemes forward-secure against state exposure. Comput. J. 56(4), 497–507 (2013)