Author:
Espitau Thomas,Fouque Pierre-Alain,Gérard Benoît,Tibouchi Mehdi
Publisher
Springer International Publishing
Reference39 articles.
1. Commercial national security algorithm suite and quantum computing FAQ. Technical report, National Security Agency, January 2016. https://www.iad.gov/iad/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/cnsa-suite-and-quantum-computing-faq.cfm
2. Lecture Notes in Computer Science;S Akleylek,2016
3. Lecture Notes in Computer Science;I Biehl,2000
4. Bindel, N., Buchmann, J.A., Krämer, J.: Lattice-based signature schemes and their sensitivity to fault attacks. IACR Cryptology ePrint Archive 2016:415 (2016)
5. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. J. Cryptol. 14(2), 101–119 (2001)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献