최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.33 no.2, 2023년, pp.21 - 30
김현준 (한성대학교 정보컴퓨터공학과) , 엄시우 (한성대학교 정보컴퓨터공학과) , 송민호 (한성대학교 융합보안학과) , 서화정 (한성대학교 융합보안학과)
Arute, Frank, et al. "Quantum supremacy using a programmable superconducting processor." Nature 574.7779, pp. 505-510, 2019.?
Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2, pp.120-126, 1978.?
Shor, Peter W. "Algorithms for quantum computation: discrete logarithms and factoring." Proceedings 35th annual symposium on foundations of computer science. Ieee, 1994.?
Grover, Lov K. "A fast quantum mechanical algorithm for database search." Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. 1996.?
Peikert, Chris, "Lattice Cryptography for the Internet", IACR. Archived from the original on 12 May 2014.?
Stehle, D., and R. Steinfeld. "Making NTRUEnrypt and NTRUSign as secure as standard worst-case problems over ideal lattices." Cryptology ePrint Archive, Report 2013/004, 2013.?
Overbeck, R., and N. Sendrier. "Code-based cryptography, Post-Quantum Cryptography, ed. by DJ Bernstein, J. Buchmann, E. Dahmen." pp. 95-145, 2009.?
Bulygin, Stanislav, Albrecht Petzoldt, and Johannes Buchmann. "Towards provable security of the unbalanced oil and vinegar signature scheme under direct attacks." Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings 11. Springer Berlin Heidelberg, 2010.?
Patarin, Jacques. "Hidden fields equations (HFE) and isomorphisms of polynomials (IP): Two new families of asymmetric algorithms." Advances in Cryptology-EUROCRYPT'96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12-16, 1996 Proceedings 15. Springer Berlin Heidelberg, 1996.?
Merkle, Ralph Charles. Secrecy, authentication, and public key systems. Stanford university, 1979.?
Buchmann, Johannes; Dahmen, Erik; Hulsing, Andreas, "XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions". Post-Quantum Cryptography. PQCrypto 2011. Lecture Notes in Computer Science. Vol. 7071. pp. 117-129, 2011.?
Costello, Craig, Patrick Longa, and Michael Naehrig. "Efficient algorithms for supersingular isogeny Diffie-Hellman." Advances in Cryptology-CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I 36. Springer Berlin Heidelberg, 2016.?
Jao, David, and Luca De Feo. "Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies." Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29-December 2, 2011. Proceedings 4. Springer Berlin Heidelberg, 2011.?
NIST, "Round 1 Submissions", 2017, https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-1-submissions?
NIST, "Round 2 Submissions", 2019, https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-2-submissions?
NIST, "Round 3 Submissions", 2020, https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-3-submissions?
NIST, "Selected Algorithms 2022", 2022, https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022?
NIST, "Round 4 Submissions", 2022, https://csrc.nist.gov/Projects/post-quantum-cryptography/round-4-submissions?
Alagic, Gorjan, et al. "Status report on the third round of the NIST post-quantum cryptography standardization process", US Department of Commerce, NIST, 2022.?
Barker, William, William Polk, and Murugiah Souppaya. "Getting ready for post-quantum cryptography: explore challenges associated with adoption and use of post-quantum cryptographic algorithms." The Publications of NIST Cyber Security White Paper (DRAFT), CSRC, NIST, GOV 26, 2020.?
YB Kim, JG Song and SC Seo. "Accelerating Falcon on ARMv8." IEEE Access 10, 44446-44460, 2022.?
MS CHEN, T CHOU and M KRAUSZ. "Optimizing BIKE for the intel Haswell and ARM Cortex-M4." Cryptology ePrint Archive, 2021.?
SHEN, Shiyu, et al. "High-Throughput GPU Implementation of Dilithium Post-Quantum Digital Signature." arXiv preprint arXiv:2211.12265, 2022.?
NIST, "Submission Requirements and Evaluation Criteria?for the Post-Quantum Cryptography Standardization Process", 2016, https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/call-for-proposals-final-dec-2016.pdf?
Abdulrahman, Amin, et al. "Faster kyber and dilithium on the cortex-m4." Applied Cryptography and Network Security: Proceedings. Cham: Springer International Publishing, 2022.?
MS CHEN and T CHOU. "Classic McEliece on the ARM cortex-M4." IACR Transactions on Cryptographic Hardware and Embedded Systems, 125-148. 2021.?
Stebila, Douglas, and Michele Mosca. "Post-quantum key exchange for the internet and the open quantum safe project." Cham: Springer International Publishing, 2017.?
NIST, "Fourth PQC Standardization Conference", 2022, https://csrc.nist.gov/events/2022/fourth-pqc-standardization-conference?
E CROCKETT, C PAQUIN, D STEBILA. "Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH." Cryptology ePrint Archive, 2019.?
TASOPOULOS, George, et al. "Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems." Cham: Springer International Publishing, p. 432-451, 2022.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.