Author:
Chen Ming-Shing,Hülsing Andreas,Rijneveld Joost,Samardjiska Simona,Schwabe Peter
Publisher
Springer Berlin Heidelberg
Reference59 articles.
1. Lecture Notes in Computer Science;S Akleylek,2016
2. Alkim, E., Bindel, N., Buchmann, J., Dagdelen, O.: TESLA: tightly-secure efficient signatures from standard lattices. Cryptology ePrint Archive (2015)
3. Lecture Notes in Computer Science;S Bai,2014
4. Bardet, M., Faugère, J., Salvy, B.: On the complexity of the F5 Gröbner basis algorithm. J. Symbolic Comput. 70, 49–70 (2015)
5. Bernstein, D.J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lange, T., Niederhagen, R., van Vredendaal, C.: How to manipulate curve standards: a white paper for the black hat. Cryptology ePrint Archive (2014)
Cited by
56 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献