References
- TrendForce Says Global Mobile Payment Market to Reach US$620 Billion in 2016 with Apple and Samsung Staking Large Claims in the Ecosystem, https://press.trendforce.com/node/prints/2298 (accessed Dec., 17, 2017).
- X. Chen, K. Choi, and K.J. Chae, "A Secure and Efficient Key Authentication Using Bilinear Pairing for NFC Mobile Payment Service," Wireless Personal Communications, Vol. 97, No. 1, pp. 1-17, 2017. https://doi.org/10.1007/s11277-017-4261-9
- P.W. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring," Proceeding of 35th Annual Symposium Foundations of Computer Science and IEEE Computer Society and Los Alamitos and CA, pp. 124-134, 1994.
- L.K. Grover, "A Fast Quantum Mechanical Algorithm for Database Search," Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 212-219, 1996.
- ETSI, Quantum Safe Cryptography and Security, NO. 979-10-92620-09-0, 2015.
- NIST, Report on Post-Quantum Cryptography, IR 8105, 2016.
- J. Hoffstein, J. Pipher, and J.H. Silverman, "NTRU: A Ring-Based Public Key Cryptosystem," ANTS 1998: Algorithmic Number Theory, Vol. 1423, pp. 267-288, 1998.
- IEEE, IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices, International Association for Cryptologic Research Eprint Archive, 2008.
- S.H. Jeong, K.K. Lee, and Y.H. Park, "Secure NTRU-based Authentication and Key Distribution Protocol in Quantum Computing Environments," Journal of Korea Multimedia Society, Vol. 20, No. 8, pp. 1321-1329, 2017. https://doi.org/10.9717/KMMS.2017.20.8.1321
- NTRU Cryptosystems, A Meet-In-The-Middle attack on an NTRU Private Key, Technical Report, 2003.
- E. Jaulmes and A. Joux. "A Chosen Ciphertext Attack against NTRU," Proceeding of 20th Annual International Cryptology Conference Santa Barbara, pp. 21-36, 2000.
- J. Hoffstein and J. Silverman. "Optimizations for NTRU," Proceedings of Public Key Cryptography and Computational Number Theory, pp. 77-86, 2001.
- NTRU Cryptosystems, Protecting NTRU against Chosen Ciphertext and Reaction Attacks, Technical Report, 2000.
- N.H. Graham, J.H. Silverman, A. Singer, and W. Whyte. "NAEP: Provable Security in the Presence of Decryption Failures," IACR Cryptology, 2003.
- Practical Comparison of Fast Public-key Cryptosystems, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.96.5694&rep=rep1&type=pdf (accessed Feb., 05, 2018).
- Y.P. Liao and C.M. Hsiao, "An Novel Multi-server Remote User Authentication Scheme using Self-certified Public Keys for Mobile Clients," Future Generation Computer Systems, Vol. 29, No. 3, pp. 886-900, 2013. https://doi.org/10.1016/j.future.2012.03.017