[1] |
REGEV O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography[J]. Journal of the ACM, 2009,56(6):84-93.
|
[2] |
LYUBASHEVSKY V, PEIKERT C, REGEV O. On Ideal Lattices and Learning with Errors Over Rings [C]//Springer. 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 30 - June 3, 2010, Monaco and Nice, France. Berlin: Springer, 2010: 1-23.
|
[3] |
LANGOLOIS A, STEHLÉ D. Worst-Case to Average-Case Reductions for Module Lattices[J]. Designs, Codes and Cryptography, 2015,75(3):565-599.
|
[4] |
DING Jintai, LIN Xiaodong. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem[J]. IACR Cryptology ePrint Archive, 2012,2012(1):688-703.
|
[5] |
PEIKERT C. Lattice Cryptography for the Internet [C]//Springer. Post-Quantum Cryptography: 6th International Workshop, October 1-3, 2014, Waterloo, ON, Canada. Berlin: Springer, 2014: 197-219.
|
[6] |
BOS J, COSTELLO C, NAEHRIG M, et al. Post-quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem [C]//IEEE. 2015 IEEE Symposium on Security and Privacy, May 17-21, 2015, San Jose, CA, USA. Piscataway: IEEE, 2015: 553-570.
|
[7] |
ALKIM E, DUCAS L, PÖPPELMANN T, et al. Post Quantum Key Exchange—A New Hope [C]// USENIX. 25th USENIX Security Symposium, August 10-12, 2016, Austin, TX. Berkeley: USENIX, 2016: 327-343.
|
[8] |
BOS J, COSTELLO C, DUCAS L, et al. Frodo: Take off the Ring! Practical, Quantum-secure Key Exchange from LWE [C]//ACM. 23rd ACM Conference on Computer and Communications Security, October 24-28, 2016, Vienna, Austria. New York: ACM, 2016: 1006-1018.
|
[9] |
JIN Zhenzhong, ZHAO Yunlei. Optimal Key Consensus in Presence of Noise[J]. IACR Cryptology ePrint Archive, 2017,2017(1):1058-1122.
|
[10] |
DING Jintai, ALSAYIGH S, LANCRENON J, et al. Provably Secure Password Authenticated Key Exchange Based on RLWE for The Postquantum World [C]//Springer. The Cryptographers' Track at the RSA Conference, February 14-17, 2017, San Francisco, CA, USA, Berlin: Springer, 2017: 183-204.
|
[11] |
MACKENZIE P. The PAK Suite: Protocols for Password-authenticated Key Exchange: United States, 1363. 2[P]. 2001-11-1.
|
[12] |
BOYKO V, MACKENZIE P, PATEL S. Provably Secure Password-authenticated Key Exchange Using Diffie-Hellman [C]//Springer. EUROCRYPT: International Conference on the Theory and Applications of Cryptographic Techniques, May 14-18, 2000, Bruges, Belgium. Berlin: Springer, 2000: 156-171.
|
[13] |
BINDEL N, BUCHMANN J, RIE S. Comparing Apples with Apples: Performance Analysis of Lattice-Based Authenticated Key Exchange Protocols[J]. International Journal of Information Security, 2018,17(6):701-718.
|
[14] |
BELLARE M, ROGAWAY, P. Entity Authentication and Key Distribution[C]//Springer. 13th Annual International Cryptology Conference, August 22-26, 1993, California, USA. Berlin: Springer, 1993: 232-249.
|
[15] |
GAO Xinwei. Comparison Analysis of Ding's RLWE-Based Key Exchange Protocol and Newhope Variants[J]. Advances in Mathematics of Communications, 2019,13(2):221-223.
|