Browse > Article

양자컴퓨터 상에서의 양자 알고리즘의 위협과 양자 내성을 가지는 양자 내성 암호에 대한 최신 연구 동향  

Jang, Kyungbae (한성대학교 IT융합공학부)
Kim, Hyunji (한성대학교 IT융합공학부)
Song, Gyeongju (한성대학교 IT융합공학부)
Seo, Hwajeong (한성대학교 IT융합공학부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Jang, S. Choi, H. Kwon, H. Kim, J. Park, H. Seo, "Grover on Korean Block Ciphers," Applied Sciences, 10(18), 6407, 2020.   DOI
2 H. Seo, M. Anastasova, A. Jalali, R. Azarderakhsh, "Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4," IEEE Transactions on Computers, 2020.
3 P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM review, 41(2), pp. 303-332, 1999.   DOI
4 L. K. Grover, "A fast quantum mechanical algorithm for database search," In Proceedings of the twenty- eighth annual ACM symposium on Theory of computing, pp. 212-219, 1996.
5 G. Banegas, D. J. Bernstein, I. van Hoof, T. Lange, "Concrete quantum cryptanalysis of binary elliptic curves,"" IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 451-472, 2021.
6 W. Barker, W. Polk, M. Souppaya, "Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms," National Institute of Standards and Technology, 2020.
7 C. Paquin, D. Stebila, G. Tamvada, "Benchmarking post-quantum cryptography in TLS," In International Conference on Post-Quantum Cryptography, pp. 72-91, 2020.
8 A. Petzoldt, "Efficient key generation for rainbow," In International Conference on Post-Quantum Cryptography, pp. 92-107, 2020.
9 N. Sendrier, V. Vasseur, "About low DFR for QC-MDPC decoding," In International Conference on Post-Quantum Cryptography, pp. 20-34, 2020.
10 D. Amiet, A. Curiger, L. Leuenberger, P. Zbinden, "Defeating NewHope with a single trace," In International Conference on Post-Quantum Cryptography, pp. 189-205, 2020.
11 D. O. Greconici, M. J. Kannwischer, D. Sprenkels, "Compact Dilithium Implementations on Cortex-M3 and Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 1-24, 2021.
12 J. W. Bos, A. Hulsing, J. Renes, C. van Vredendaal, "Rapidly Verifiable XMSS Signatures," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 137-168, 2021.
13 T. Fritzmann, G. Sigl, J. Sepulveda, "RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 239-280, 2020.
14 T. Haner, S. Jaques, M. Naehrig, M. Roetteler, M. Soeken, "Improved quantum circuits for elliptic curve discrete logarithms," In International Conference on Post-Quantum Cryptography, pp. 425-444, 2020.
15 J. Howe, T. Prest, T. Ricosset, M. Rossi, "Isochronous Gaussian sampling: from inception to implementation," In International Conference on Post-Quantum Cryptography, pp. 53-71, 2020.
16 E. Alkim, D. Y. L. Cheng, C. M. M. Chung, H. Evkan, L. W. L. Huang, V. Hwang, B. Y. Yang, "Polynomial Multiplication in NTRU Prime," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 217-238, 2021.