[1] |
KELLY J , BARENDS R , FOWLER A G ,et al. State preservation by repetitive error detection in a superconducting quantum circuit[J]. Nature, 2015,519(7541): 66-69.
|
[2] |
SHOR P W . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Review, 1999,41(2): 303-332.
|
[3] |
杨妍玲 . 后量子密码在信息安全中的应用与分析[J]. 信息与电脑(理论版), 2020,32(8): 177-181.
|
|
YANG Y L . Application and analysis of post-quantum cryptography in information security[J]. Information and Computers (Theoretical), 2020,32(8): 177-181.
|
[4] |
CHEN L , JORDAN S , LIU Y K ,et al. Report on post-quantum cryptography[M]. Maryland: National Institute of Standards and Technology, 2016.
|
[5] |
ALAGIC G , ALPERIN-SHERIFF J , APON D ,et al. Status report on the first round of the NIST post-quantum cryptography standardization process[M]. Maryland: National Institute of Standards and Technology, 2019.
|
[6] |
ROMA C A , TAI C A , HASAN M A . Energy consumption of round 2 submissions for NIST PQC standards[R]. Maryland:National Institute of Standards and Technology, 2019.
|
[7] |
中国密码学会. 全国密码算法设计竞赛进入第2轮公钥算法[EB].
|
|
Chinese Association for Cryptologic Research. Public key scheme selected to the second-round competition of national cryptographic algorithm competition[EB].
|
[8] |
中国密码学会. 关于全国密码算法设计竞赛算法评选结果的公示[EB].
|
|
Chinese Association for Cryptologic Research. Announcement of the selection results of the national cryptographic algorithm competition[EB].
|
[9] |
REGEV O . On lattices,learning with errors,random linear codes,and Cryptography[J]. Journal of the ACM (JACM), 2009,56(6): 1-40.
|
[10] |
AJTAI M , . Generating hard instances of lattice problems[C]// Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing. 1996: 99-108.
|
[11] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[J]. Journal of the ACM (JACM), 2013,60(6): 1-35.
|
[12] |
中国密码学会. 数字签名方案 Aigis-sig 算法提交文档[EB].
|
|
Chinese Association for Cryptologic Research. Submitted document of the digital signature scheme Aigis-sig[EB].
|
[13] |
NEJATOLLAHI H , DUTT N , RAY S ,et al. Software and hardware implementation of lattice-cased cryptography schemes[J]. University of California Irvine,CECSTR 17 4 (2017).
|
[14] |
DE C R , ROY S S , VERCAUTEREN F ,et al. Efficient software implementation of Ring-LWE encryption[C]// Proceedings of the Design,Automation & Test in Europe Conference & Exhibition (DATE′15). 2015.
|
[15] |
YUAN Y J , CHENG C M , KIYOMOTO S ,et al. Portable implementation of lattice-based cryptography using JavaScript[J]. International Journal of on Computing and Networking, 2016,6(3): 309-327.
|
[16] |
STEBILA D , MOSCA M . Post-quantum key exchange for the internet and the open quantum safe project[R]. Cryptology ePrint Archive, 2016.
|
[17] |
AGUILAR-MELCHOR C , BARRIER J , GUELTON S ,et al. NFLlib:NTT-based fast lattice library[C]// RSA Conference. 2016: 341-356.
|
[18] |
CHEN H , HAN K , HUANG Z ,et al. Simple encrypted arithmetic library - seal (v2.3)[R]. 2017.
|
[19] |
TTERT N , FELLER T , SCHNEIDER M ,et al. On the design of hardware building blocks for modern lattice-based encryption schemes[C]// Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES′12). 2012.
|
[20] |
P?PPELMANN T , GüNEYSU T , . Area optimization of lightweight Lattice-based encryption on reconfigurable hardware[C]// Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS′14). 2014.
|
[21] |
ROY S S , VERCAUTEREN F , MENTENS N ,et al. Compact ring-LWE cryptoprocessor[C]// Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems (CHES′14). 2014.
|
[22] |
BASU K , SONI D , NABEEL M ,et al. NIST post-quantum cryptography-a hardware evaluation study[C]// IACR Cryptology ePrint Archive. 2019:47.
|
[23] |
DANG V B , FARAHMAND F , ANDRZEJCZAK M ,et al. Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign[C]// 2019 International Conference on Field-Programmable Technology (ICFPT). 2019: 206-214.
|
[24] |
BANERJEE U , UKYAB T S , CHANDRAKASAN A P . Sapphire:a configurable crypto-processor for post-quantum Lattice-based protocols (Extended Version)[C]// IACR Crypto.ePrint Arch. 2019:1140.
|
[25] |
XIN G Z , HAN J , YIN T Y ,et al. VPQC:a domain-specific vector processor for post-quantum cryptography based on RISC-V architecture[J]. IEEE Transactions on Circuits and Systems I-regular Papers, 2020,67(8): 2672-2684.
|
[26] |
FENG X , LI S G , XU S F . RLWE-oriented high-speed polynomial multiplier utilizing multi-lane stockham NTT algorithm[J]. IEEE Transactions on Circuits and Systems Ⅱ:Express Briefs, 2019,99: 1.
|
[27] |
DU C H , BAI G Q . Towards efficient polynomial multiplication for Lattice-based cryptography[C]// 2016 IEEE International Symposium on Circuits and Systems (ISCAS). 2016: 1178-1181.
|