[1] |
SCHNEIER B . IoT cybersecurity:what's plan B[R]. 2017.
|
[2] |
朱小伶 . 2020年量子计算技术发展综述[J]. 无人系统技术, 2021,4(2): 26-32.
|
|
ZHU X L . Survey of quantum computing technology in 2020[J]. Unmanned Systems Technology, 2021,4(2): 26-32.
|
[3] |
张成磊, 付玉龙, 李晖 ,等. 6G网络安全场景分析及安全模型研究[J]. 网络与信息安全学报, 2021,7(1): 28-45.
|
|
ZHANG C L , FU Y L , LI H ,et al. Research on security scenarios and security models for 6G networking[J]. Chinese Journal of Network and Information Security, 2021,7(1): 28-45.
|
[4] |
陈璐, 汤红波, 游伟 ,等. 移动边缘计算安全防御研究[J]. 网络与信息安全学报, 2021,7(1): 130-142.
|
|
CHEN L , TANG H B , YOU W ,et al. Research on security defense of mobile edge computing[J]. Chinese Journal of Network and Information Security, 2021,7(1): 130-142.
|
[5] |
LYUBASHEVSKY V , PEIKERT C , REGEV O . On ideal lattices and learning with errors over rings[M]. Advances in Cryptology –EUROCRYPT 2010. Berlin,Heidelberg: Springer Berlin Heidelberg, 2010: 1-23.
|
[6] |
P?PPELMANN T , GüNEYSU T , . Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware[M]. Progress in Cryptology-LATINCRYPT 2012. Berlin,Heidelberg: Springer Berlin Heidelberg, 2012: 139-158.
|
[7] |
ROY S S , VERCAUTEREN F , MENTENS N ,et al. Compact ring-LWE cryptoprocessor[C]// Cryptographic Hardware and Embedded Systems – CHES 2014. 2014: 371-391.
|
[8] |
FRITZMANN T , SEPúLVEDA J ,, . Efficient and flexible low-power NTT for lattice-based cryptography[C]// Proceedings of 2019 IEEE International Symposium on Hardware Oriented Security and Trust. 2019: 141-150.
|
[9] |
DE CLERCQ R , ROY S S , VERCAUTEREN F ,et al. Efficient software implementation of ring-LWE encryption[C]// Proceedings of Design,Automation & Test in Europe Conference & Exhibition (DATE). 2015: 339-344.
|
[10] |
BOORGHANY A , SARMADI S B , JALILI R . On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards[J]. ACM Transactions on Embedded Computing Systems, 2015,14(3): 1-25.
|
[11] |
LIU Z , AZARDERAKHSH R , KIM H ,et al. Efficient software implementation of ring-LWE encryption on IoT processors[J]. IEEE Transactions on Computers, 2020,69(10): 1424-1433.
|
[12] |
SEO H , KWON H , KWON Y ,et al. Fast number theoretic transform for ring-LWE on 8-bit AVR embedded processor[J]. Sensors, 2020,20(7): 2039.
|
[13] |
BUCHMANN J , G?PFERT F , GüNEYSU T ,et al. High- performance and lightweight lattice-based public-key encryption[C]// Proceedings of the 2nd ACM International Workshop on IoT Privacy,Trust,and Security. 2016: 2-9.
|
[14] |
AYSU A , ORSHANSKY M , TIWARI M . Binary Ring-LWE hardware with power side-channel countermeasures[C]// Proceedings of 2018 Design,Automation & Test in Europe Conference & Exhibition (DATE). 2018: 1253-1258.
|
[15] |
EBRAHIMI S , BAYAT-SARMADI S , MOSANAEI-BOORANI H . Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT[J]. IEEE Internet of Things Journal, 2019,6(3): 5500-5507.
|
[16] |
EBRAHIMI S , BAYAT-SARMADI S . Lightweight and DPA-resistant post-quantum cryptoprocessor based on binary ring-LWE[C]// Proceedings of 2020 20th International Symposium on Computer Architecture and Digital Systems (CADS). 2020: 1-6.
|
[17] |
EBRAHIMI S , BAYAT-SARMADI S , . Lightweight and fault-resilient implementations of binary ring-LWE for IoT devices[J]. IEEE Internet of Things Journal, 2020,7(8): 6970-6978.
|
[18] |
XIE J F , HE P Z , WEN W J . Efficient implementation of finite field arithmetic for binary ring-LWE post-quantum cryptography through a novel lookup-table-like method[C]// Proceedings of 2021 58th ACM/IEEE Design Automation Conference. 2021: 1279-1284.
|
[19] |
HE P Z , GUIN U , XIE J F . Novel low-complexity polynomial multiplication over hybrid fields for efficient implementation of binary ring-LWE post-quantum cryptography[J]. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2021,11(2): 383-394.
|
[20] |
FERNáNDEZ-CARAMéS T M . From pre-quantum to post-quantum IoT security:a survey on quantum-resistant cryptosystems for the Internet of Things[J]. IEEE Internet of Things Journal, 2020,7(7): 6457-6480.
|
[21] |
BUCHMANN J , G?PFERT F , PLAYER R ,et al. On the hardness of LWE with binary error:Revisiting the hybrid lattice-reduction and meet-in-the-middle attack[C]// International Conference on Cryptology in Africa. 2016: 24-43.
|
[22] |
PARK A , HAN D G . Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption[C]// Proceedings of 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). 2016: 1-6.
|
[23] |
KOCHER P , JAFFE J , JUN B ,et al. Introduction to differential power analysis[J]. Journal of Cryptographic Engineering, 2011,1(1): 5-27.
|