1. Peikert C (2014) Lattice cryptography for the Internet[C]. In: 6th International Workshop on Post-Quantum Cryptography (PQCrypto 2014). LNCS, vol 8772, Springer, Cham, : 197–219
2. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J];Yang Yatao Z;J Comput Res Dev,2017
3. Bidirectional authenticated key agreement protocol supporting identity’s privacy preservation based on RLWE[J];Yang YT;J Commun,2019
4. Alkim E, Ducas L, PoppelmannT et al (2016) NewHope without reconciliation[J]. IACR Cryptology ePrint Archive, 2016, 1157: 20171109:073050
5. Katz J, Vaikuntanathan V (2009) Smooth projective hashing and password-based authenticated key exchange from lattices[C]. In: 15th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2009). LNCS, vol 5912, Springer, Berlin, Heidelberg, : 636–652