Author:
Dachman-Soled Dana,Ducas Léo,Gong Huijing,Rossi Mélissa
Publisher
Springer International Publishing
Reference35 articles.
1. Albrecht, M.R., et al.: Estimate all the $$\{$$LWE, NTRU$$\}$$ schemes! In: Catalano, D., De Prisco, R. (eds.) SCN 2018. LNCS, vol. 11035, pp. 351–367. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98113-0_19
2. Albrecht, M.R., Deo, A., Paterson, K.G.: Cold boot attacks on ring and module LWE keys under the NTT. IACR TCHES 2018, 173–213 (2018)
3. Lecture Notes in Computer Science;MR Albrecht,2017
4. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 327–343 (2016)
5. Bai, S., Miller, S., Wen, W.: A refined analysis of the cost for solving LWE via uSVP. Cryptology ePrint Archive, Report 2019/502 (2019)
Cited by
67 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献