양자컴퓨터 상에서의 양자 알고리즘의 위협과 양자 내성을 가지는 양자 내성 암호에 대한 최신 연구 동향 |
Jang, Kyungbae
(한성대학교 IT융합공학부)
Kim, Hyunji (한성대학교 IT융합공학부) Song, Gyeongju (한성대학교 IT융합공학부) Seo, Hwajeong (한성대학교 IT융합공학부) |
1 | K. Jang, S. Choi, H. Kwon, H. Kim, J. Park, H. Seo, "Grover on Korean Block Ciphers," Applied Sciences, 10(18), 6407, 2020. DOI |
2 | H. Seo, M. Anastasova, A. Jalali, R. Azarderakhsh, "Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4," IEEE Transactions on Computers, 2020. |
3 | P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM review, 41(2), pp. 303-332, 1999. DOI |
4 | L. K. Grover, "A fast quantum mechanical algorithm for database search," In Proceedings of the twenty- eighth annual ACM symposium on Theory of computing, pp. 212-219, 1996. |
5 | G. Banegas, D. J. Bernstein, I. van Hoof, T. Lange, "Concrete quantum cryptanalysis of binary elliptic curves,"" IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 451-472, 2021. |
6 | W. Barker, W. Polk, M. Souppaya, "Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms," National Institute of Standards and Technology, 2020. |
7 | C. Paquin, D. Stebila, G. Tamvada, "Benchmarking post-quantum cryptography in TLS," In International Conference on Post-Quantum Cryptography, pp. 72-91, 2020. |
8 | A. Petzoldt, "Efficient key generation for rainbow," In International Conference on Post-Quantum Cryptography, pp. 92-107, 2020. |
9 | N. Sendrier, V. Vasseur, "About low DFR for QC-MDPC decoding," In International Conference on Post-Quantum Cryptography, pp. 20-34, 2020. |
10 | D. Amiet, A. Curiger, L. Leuenberger, P. Zbinden, "Defeating NewHope with a single trace," In International Conference on Post-Quantum Cryptography, pp. 189-205, 2020. |
11 | D. O. Greconici, M. J. Kannwischer, D. Sprenkels, "Compact Dilithium Implementations on Cortex-M3 and Cortex-M4," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 1-24, 2021. |
12 | J. W. Bos, A. Hulsing, J. Renes, C. van Vredendaal, "Rapidly Verifiable XMSS Signatures," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 137-168, 2021. |
13 | T. Fritzmann, G. Sigl, J. Sepulveda, "RISQ-V: Tightly coupled RISC-V accelerators for post-quantum cryptography," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 239-280, 2020. |
14 | T. Haner, S. Jaques, M. Naehrig, M. Roetteler, M. Soeken, "Improved quantum circuits for elliptic curve discrete logarithms," In International Conference on Post-Quantum Cryptography, pp. 425-444, 2020. |
15 | J. Howe, T. Prest, T. Ricosset, M. Rossi, "Isochronous Gaussian sampling: from inception to implementation," In International Conference on Post-Quantum Cryptography, pp. 53-71, 2020. |
16 | E. Alkim, D. Y. L. Cheng, C. M. M. Chung, H. Evkan, L. W. L. Huang, V. Hwang, B. Y. Yang, "Polynomial Multiplication in NTRU Prime," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 217-238, 2021. |