References
- R.P. Feynman, "Simulating Pysics with Computers," International Journal of Theoretical Physics, Vol. 21, No. 6-7, pp. 467-488, 1982. https://doi.org/10.1007/BF02650179
- P.W. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring," Proceedings of 35th Annual Symposium on Foundations of Computer Science and IEEE Computer Society, pp. 124-134, 1994.
- S.Y. Lee, K.S. Park, Y.H. Park, and Y.H. Park, “Symmetric Key-Based Remote User Authentication Scheme with Forward Secrecy,” Journal of Korea Multimedia Society, Vol. 19, No. 3, pp. 585-594, 2016. https://doi.org/10.9717/kmms.2016.19.3.585
- J. Hoffstein, J. Pipher, and J.H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," Algorithmic Number Theory and Lecture Notes in Computer Science, Vol. 1423, pp. 267-288, 1998.
- IEEE, IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices, International Association for Cryptologic Research Eprint archive, 2008.
- X. Lei and X. Liao, "NTRU-KE: A Lattice-based Public Key Exchange Protocol," IACR Cryptology ePrint Archive 2013/ 718, 2013.
- S.W. Park and I.Y. Lee, "Anonymous Authentication Scheme Based on NTRU for the Protection of Payment Information in NFC Mobile Environment," Journal of Information Processing Systems, Vol. 9, No. 3, pp. 461-476, 2013. https://doi.org/10.3745/JIPS.2013.9.3.461
- S.W. Park and I.Y. Lee, “Authentication Scheme Based on NTRU for the Protection of Payment Information in NFC Mobile Environment,” Korea Information Processing Society Transactions on Computer and Communication Systems, Vol. 2, No. 3, pp. 133-142, 2013.
- M.R. Valluri, Cryptanalysis of Xinyu et al.'s NTRU-Lattice Based Key Exchange Protocol, https://arxiv.org/abs/1611.08686v1, 2016.
- Y.S. Jheng, "Security Analysis of a NTRU-based Mutual Authentication Scheme," Proceeding of Asia-Pacific Network Operations and Management Symposium, pp. 3, 2016.
- ETSI, Quantum Safe Cryptography and Security, ISBN No. 979-10-92620-09-0, 2015.
- NIST, Report on Post-Quantum Cryptography, NISTIR 8105, 2016.