[1] |
SHOR P W . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. Siam Review, 1999,41(2): 303-332.
|
[2] |
陈宇航, 贾徽徽, 姜丽莹 ,等. 基于 Grover 算法的 ECC 扫描式攻击[J]. 信息网络安全, 2016,16(2): 28-32.
|
|
CHENY H , JIA H H , JIANG L Y ,et al. ECC scanning attack based on Grover algorithm[J]. Netinfo Security, 2016,16(2): 28-32.
|
[3] |
GROVER L K , . A fast quantum mechanical algorithm for database search[C]// Symposium on the Theory of Computing. 1996: 212-219.
|
[4] |
眭晗, 吴文玲 . 后量子对称密码的研究现状与发展趋势[J]. 电子与信息学报, 2020,42(2): 287-294.
|
|
SUI H , WU W L . Research status and development trend of post-quantum symmetric cryptography[J]. Journal of Electronics and Information Technology, 2020,42(2): 287-294.
|
[5] |
Post-quantum cryptography[M]. 电子与信息学报, 2019.
|
[6] |
POTII A V , KАRPENKO А S . Realization of the post-quantum algorithm of the electronic digital signature[J]. Telecommunications and Radio Engineering, 2017,76(9).
|
[7] |
王丽萍, 戚艳红 . 基于编码的后量子公钥密码研究进展[J]. 信息安全学报, 2019,4(2): 20-28.
|
|
WANG L P , QI Y H . Recent progress of code-based post-quavhum pucolic key cryptography[J]. Journal of Information Security, 2019,4(2): 20-28.
|
[8] |
MCELIECE R J . A public-key cryptosystem based onalgebraic coding theory[J]. DSN Progress Report, 1978,42(44): 114-116.
|
[9] |
NIEDERREITER H . Knapsack-type cryptosystems and algebraic coding theory[J]. Problems of Control and Information Theory, 1986,15(2): 159-166.
|
[10] |
BARELLI E . On the security of some compact keys for McEliece scheme[J]. arXiv preprint arXiv:1803.05289, 2018
|
[11] |
WANG Y , . Quantum resistant random linear code based public key encryption scheme RLCE[C]// 2016 IEEE International Symposium on Information Theory (ISIT). 2016: 2519-2523.
|
[12] |
WANG Y . Revised quantum resistant public key encryption scheme RLCE and IND-CCA2 security for McEliece schemes[J]. IACR Cryptology ePrint Archive,2017, 2017:206.
|
[13] |
MATTHEWS G L , WANG Y . Quantum resistant public key encryption scheme hermitianRLCE[C]// Code-Based Cryptography Workshop. 2019: 1-10.
|
[14] |
LIU J , WANG Y , YI Z ,et al. Quantum resistant public key encryption scheme polarRLCE[C]// International Conference on Algebra,Codes and Cryptology. 2019: 114-128.
|
[15] |
ARIKAN E , . Channel polarization:a method for constructing capacity-achieving codes[C]// 2008 IEEE International Symposium on Information Theory. 2008: 1173-1177.
|
[16] |
张胜军, 钟州, 金梁 ,等. 基于安全极化码的密钥协商方法[J]. 电子与信息学报, 2019,41(6): 1413-1419.
|
|
ZHANG S J , ZHONG Z , JIN L ,et al. Secret key agreement based on secure polar code[J]. Journal of Electronics and Information Technology, 2019,41(6): 1413-1419.
|
[17] |
ZHANG H , LI R , ZHANG G ,et al. Communication method using polar code,and wireless device:U.S.patent application 16/391,327[P].2019-8-22.
|
[18] |
SHRESTHA S R , KIM Y S . New McEliece cryptosystem based on polar codes as a candidate for post-quantum cryptography[C]// 2014 14th International Symposium on Communications and Information Technologies (ISCIT). 2014: 368-372.
|
[19] |
HOOSHMAND R , SHOOSHTARI M K , AREF M R . PKC-PC:a variant of the mcEliece public key cryptosystem based on Polar codes[J]. arXiv preprint arXiv:1712.07672, 2017
|
[20] |
POINTCHEVAL D , . Chosen ciphertext security for any one-way cryptosystem[C]// International Workshop on Public Key Cryptography. 2000: 129-146.
|
[21] |
FUJISAKI E , OKAMOTO T . Secure integration of asymmetric and symmetric encryption schemes[J]. Journal of Cryptology, 2013,26(1): 80-101.
|
[22] |
EATON E W , YAMADA A , KALACH K . Conversion schemes for public key cryptosystems:U.S.patent application 15/852,816[J].2018-8-28.
|
[23] |
WANG Y . RLCE Key Encapsulation mechanism (RLCE-KEM) specification[J]. NIST Submission, 2017
|
[24] |
BARDET M , CHAULET J , DRAGOI V ,et al. Cryptanalysis of the McEliece public key cryptosystem based on polar codes[C]// PostQuantum Cryptography. 2016: 118-143.
|
[25] |
STERN J , . A method for finding code words of small weight[C]// International Colloquium on Coding Theory and Applications. 1988: 106-113.
|
[26] |
JOUNDAN I A , NOUH S , AZOUAZI M ,et al. A new efficient way based on special stabilizer multiplier permutations to attack the hardness of the minimum weight search problem for large BCH codes[J]. International Journal of Electrical and Computer Engineering, 2019,9(2):1232.
|