격자기반 양자내성 키 교환 알고리즘 구현
![]() |
Park, Chanhui
((주)스마트엠투엠)
Yun, Youngyeo (부산대학교) Park, Haeryong (한국인터넷진흥원) Choi, Eunyoung (한국인터넷진흥원) Kim, Howon (부산대학교) |
1 | Arute, F., Arya, K., Babbush, R. et al, Quantum supremacy using a programmable superconducting processor. Nature 574, 505-510, 2019. DOI |
2 | P.W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput, 26(5), 1484-1509, 1997. DOI |
3 | D. Stebila and M. Mosca, Post-quantum key exchange for the internet and the open quantum safe project, in Conf. International Conference on Selected Areas in Cryptography, 14-37, 2016. |
4 | M. Ajtai, Generating hard instances of lattice problem, in Conf. The 28th Annual ACM Symposium on Theory of Computing, 99-108, 1996. |
5 | J. H. Cheon et al. Lizard Tech report[Online]. Available : https://csrc.nist.gov/Projects/post-quantum-cryptography/Round-1-Submissions |
6 | O. Regev, On lattices, learning with errors, random linear codes, and cryptography, Journal of the ACM(JACM), 56(6), 1-40, 2009 DOI |
7 | J. Alwen et al. Learning with Rounding," CRYPTO 2013, 57-74, 2013 |
8 | M. Abe et al. Tag-KEM/DEM: A new framework for hybrid encryption, Journal of Cryptography, 21(1), 97-130, 2008 |
![]() |