Browse > Article

격자기반 양자내성 키 교환 알고리즘 구현  

Park, Chanhui ((주)스마트엠투엠)
Yun, Youngyeo (부산대학교)
Park, Haeryong (한국인터넷진흥원)
Choi, Eunyoung (한국인터넷진흥원)
Kim, Howon (부산대학교)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Arute, F., Arya, K., Babbush, R. et al, Quantum supremacy using a programmable superconducting processor. Nature 574, 505-510, 2019.   DOI
2 P.W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput, 26(5), 1484-1509, 1997.   DOI
3 D. Stebila and M. Mosca, Post-quantum key exchange for the internet and the open quantum safe project, in Conf. International Conference on Selected Areas in Cryptography, 14-37, 2016.
4 M. Ajtai, Generating hard instances of lattice problem, in Conf. The 28th Annual ACM Symposium on Theory of Computing, 99-108, 1996.
5 J. H. Cheon et al. Lizard Tech report[Online]. Available : https://csrc.nist.gov/Projects/post-quantum-cryptography/Round-1-Submissions
6 O. Regev, On lattices, learning with errors, random linear codes, and cryptography, Journal of the ACM(JACM), 56(6), 1-40, 2009   DOI
7 J. Alwen et al. Learning with Rounding," CRYPTO 2013, 57-74, 2013
8 M. Abe et al. Tag-KEM/DEM: A new framework for hybrid encryption, Journal of Cryptography, 21(1), 97-130, 2008