최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.32 no.2, 2022년, pp.37 - 49
권혁동 (한성대학교 IT융합공학부) , 엄시우 (한성대학교 IT융합공학부) , 심민주 (한성대학교 IT융합공학부) , 서화정 (한성대학교 IT융합공학부)
R.P.Feynman, "Simulating physics with computers," International Journal of Theoretical Physics, 21, pp.467-488 Jun 1982.
F.Arute, K.Arya, R.Babbush, D.Bacon, J.C.Bardin, R.Barends, and J.M.Martinis, "Quantum supremacy using a programmable superconducting processor," Nature, 574(7779), pp.505-510, Oct 2019.
J.Chow, O.Dial and J.Gambetta, "IBM Quantum breaks the 100 qubit processor barrier," IBM Research Blog, Nov 2021.
S.Jaques, M.Naehrig, M.Roetteler, and F.Virdia, "Implementing Grover oracles for quantum key search on AES and LowMC," In Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Cham, pp.280-310, May 2020.
P.W.Shor, "Algorithms for quantum computation: discrete logarithms and factoring," In Proceedings 35th annual symposium on foundations of computer science, Ieee, pp.124-134, Nov 1994.
A.Abdulrahman, J.P.Chen, Y.J.Chen, V.Hwang, M.J. Kannwischer, and B.Y.Yang, "Multi-moduli NTTs for saber on Cortex-M3 and Cortex-M4," Cryptology ePrint Archive, Jul 2021.
J.P.D'Anvers, A.Karmakar, S.S.Roy, and F.Vercauteren. "Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM." International Conference on Cryptology in Africa, pp.282-305, 2018.
H.Becker, V.Hwang, M.J.Kannwischer, B.Y.Yang, and S.Y.Yang, "Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1," Cryptology ePrint Archive, Nov 2021.
D.Jao, and L.D.Feo, "Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies," In International Workshop on Post-Quantum Cryptography, Springer, Berlin, Heidelberg, pp. 19-34, Nov 2011.
D. Jao, et al, "Supersingular Isogeny Key Encapsulation," NIST PQC Round 3 submission, Oct. 1, 2020.
H.Cheng, G.Fotiadis, J.Grossschadl, and P.Y.Ryan, "Highly vectorized SIKE for AVX-512," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp.41-68, Feb 2022.
J.Ding, B.Y.Yang, C.H.O.Chen, M.S.Chen, and C.M.Cheng, "New differential-algebraic attacks and reparametrization of rainbow," International Conference on Applied Cryptography and Network Security. Springer, Berlin, Heidelberg, pp.242-257, 2008.
H.Kwon, H.Kim, M.Sim, W.K.Lee, and H.Seo, "Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors," Cryptology ePrint Archive, Jul 2021
K.A.Shim, S.Lee, and N.Koo, "Efficient Implementations of Rainbow and UOV using AVX2," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp.245-269. Nov 2022.
J.Patarin, "The oil and vinegar signature scheme," In Dagstuhl Workshop on Cryptography September, Sep 1997.
A.Kipnis, and A.Shamir, "Cryptanalysis of the oil and vinegar signature scheme," In Annual international cryptology conference, Springer, Berlin, Heidelberg, pp.257-266, Aug 1998.
A.Kipnis, J.Patarin, and L.Goubin, "Unbalanced oil and vinegar signature schemes," In International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp.206-222, May 1999.
N.Courtois, L.Goubin, W.Meier, and J.D.Tacier, "Solving underdefined systems of multivariate quadratic equations," In International Workshop on Public Key Cryptography, Springer, Berlin, Heidelberg. pp.211-227, Feb 2002.
C.A.Melchor, N.Aragon, M.Bardet, S.Bettaieb, L.Bidoux, O.Blazy, J.C.Deneuville, P.Gaborit, A.Hauteville, A.Otmani, O.Ruatta, J.P.Tillich, and G.Zemor, "ROLLO-Rank-Ouroboros, LAKE& LOCKER," Submission to the NIST Post Quantum Standardization Process, Round 2, Apr 2019.
E.Gorla, "Rank-metric codes", Journal of Algebraic Combinatorics, 52(1), pp.1-19, 2020.
T.Chou, and J.H. Liou, "A Constant-time AVX2 Implementation of a Variant of ROLLO," IACR Transactions on Cryptographic Hardware and Embedded Systems, vol 2022, no. 1, pp. 152-174. Nov 2021.
S.Y.Lee, G.S.Yoo, "Implementation of IoT Sensor Communication Platformusing ARM Cortex-M4," The Journal of Korean Association of Computer Education, 25(1), pp.283-285, 2021.
I.Lin, B.Jeff, and I.Rickard, "ARM platform for performance and power efficiency-Hardware and software perspectives," 2016 International Symposium on VLSI Design, Automation and Test (VLSI-DAT), pp.1-5, 2016.
H.J.Seo, P.Sanal, and W.K.Lee, "No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms," International Conference on Information Security Applications. Springer, Cham, pp.194-205, 2021.
C.Roberto, and J.Lopez. "Software implementation of SHA-3 family using AVX2," Simposio Brasileiro em Seguranca da Informacao e de Sistemas Computacionais 14 (2014), pp.330-333, 2014.
D.Kostic and S.Gueron. "Using the new VPMADD instructions for the new post quantum key encapsulation mechanism SIKE," 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), pp.215-218, 2019.
C.M.M.Chung, V.Hwang, M.J.Kannwischer, G.Seiler, C.J.Shih, and B.Y.Yang. "NTT multiplication for NTT- unfriendly rings new speed records for saber and NTRU on Cortex-M4 and AVX2," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp.159-188, Feb 2021.
J.M.Bermudo Mera, A.Karmakar, and I.Verbauwhede. "Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography," IACR Transactions on Cryptographic Hardware and Embedded Systems, pp.222-244, Feb 2020.
M.V.Beirendonck, J.P.D'Anvers, A.Karmakar, J.Balasch, and I.Verbauwhede. "A side-channel resistant implementation of SABER," ACM Journal on Emerging Technologies in Computing Systems (JETC), 17(2) pp.1-26, 2021.
D.T.Nguyen and K.Gaj. "Optimized software implementations of CRYSTALS-Kyber, NTRU, and Saber using NEON-based special instructions of ARMv8," Proceedings of the NIST 3rd PQC Standardization Conference (NIST PQC 2021). 2021.
P.Sanal, E.Karagoz, H.Seo, R.Azarderakhsh, and M.M.Kermani. "Kyber on ARM64: compact implementations of Kyber on 64-bit ARM Cortex-A processors," Cryptology ePrint Archive, Report 2021/561, 2021.
D.J.Bernstein, T.Chou, and Peter Schwabe. "Mcbits: fast constant- time code-based cryptography," Cryptographic Hardware and Embedded Systems - CHES 2013, pp.250-272, Springer, 2013.
C.Aguilar-Melchor, N.Aragon, S.Bettaieb, L.Bidoux, O.Blazy, J.C.Deneuville, P.Gaborit, G.Zemor, A.Couvreur, and A.Hauteville. "RQC," 2020. Available: https://pqc-rqc.org/.
M.S.Chen, T.Chou, and M.Krausz. "Optimizing BIKE for the Intel Haswell and ARM Cortex-M4", IACR Transactions on Cryptographic Hardware and Embedded Systems, pp.97-124, 2021.
C.Aguilar-Melchor, N.Aragon, E.Bellini, F.Caullery, R.H.Makarim, and C.Marcolla. "Constant time algorithms for ROLLO-I-128", SN Computer Science, 2(5), pp.1-19, 2021.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.