Author:
Ilias Shaik Mohammad,Sharmila V. Ceronmani
Publisher
Springer Nature Singapore
Reference38 articles.
1. Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: 1994 Proceedings., 35th annual symposium on foundations of computer science, pp 124–134. IEEE
2. National Security Agency (NSA) Cryptography today. August 2015. https://www.nsa.gov/ia/programs/suiteb cryptography/
3. Chen L, Jordan S, Liu Y-K, Moody D, Peralta R, Perlner R, Smith-Tone D (2016) Report on postquantum cryptography. NISTIR 8105, DRAFT, 2016. http://csrc.nist.gov/publications/drafts/nistir8105/nistir 8105 draft.pdf
4. McEliece RJ (1978) A public-key cryptosystem based on algebraic coding theory. Coding Thv 4244:114–116
5. Hoffstein J, Pipher J, Silverman JH (1998) NTRU: a ring-based public key cryptosystem. In: Buhler J (ed) ANTS-III. Volume 1423 of LNCS, pp 267–288. Springer