Author:
Amiet Dorian,Curiger Andreas,Leuenberger Lukas,Zbinden Paul
Publisher
Springer International Publishing
Reference31 articles.
1. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978).
https://doi.org/10.1145/359340.359342
2. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997).
https://doi.org/10.1137/S0097539795293172
3. Dyakonov, M.: The case against quantum computing. IEEE Spectr. 56(3), 24–29 (2019)
4. Mosca, M.: Cybersecurity in an era with quantum computers: will we be ready? IEEE Secur. Priv. 16(5), 38–41 (2018).
https://doi.org/10.1109/MSP.2018.3761723
5. National Institute of Standards and Technology: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016)
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献