|
[1]
|
Liu, C.W., Liu, Y., Du, L., et al. (2023) Enhanced Sensing of Optomechanically Induced Nonlinearity by Linewidth Suppression and Optical Bistability in Cavity-Waveguide Systems. Optics Express, 31, 9236-9250. [Google Scholar] [CrossRef]
|
|
[2]
|
Yang, J.M., Liu, F., Wang, B.Y., et al. (2021) Blood Pressure States Transition Inference Based on Multi-State Markov Model. IEEE Journal of Biomedical and Health Informatics, 25, 237-246. [Google Scholar] [CrossRef]
|
|
[3]
|
Zsiborács, D. (2025) Human-Machine Teaming in Modern Warfare: Evolving Collaboration at Edge on the Battlefield.
https://www.karveinternational.com/insights/human-machine-teaming-in-modern-warfare
|
|
[4]
|
Aleisa, M.A. (2025) Block-chain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments. IEEE Access, 13, 18660-18676. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10839415 [Google Scholar] [CrossRef]
|
|
[5]
|
Lin, C., Xue, R., Yang, S., Huang, X. and Li, S. (2020) Linearly Homo-morphic Signatures from Lattices. The Computer Journal, 63, 1871-1885. [Google Scholar] [CrossRef]
|
|
[6]
|
Wu, B., Wang, C. and Yao, H. (2021) A Certificateless Linearly Homomorphic Signature Scheme for Network Coding and Its Application in the IoT. Peer-to-Peer Networking and Applications, 14, 852-872. [Google Scholar] [CrossRef]
|
|
[7]
|
Fouque, P.A., Hoffstein, J., Kirchner, P., et al. (2018) Falcon: Fast-Fourier Lattice-Based Compact Signatures over NTRU. Submission to the NIST’s Post-Quantum Cryptography Standardization Pro-cess.
|
|
[8]
|
Shah, A., Pandya, H., Soni, M., Karimov, A., Maaliw, R.R. and Keshta, I. (2023) PUF-Based Lightweight Authentication Protocol for IoT Devices. In: Lecture Notes in Networks and Systems, Springer, 401-412. [Google Scholar] [CrossRef]
|
|
[9]
|
Rana, M., Mamun, Q. and Islam, R. (2022) Lightweight Cryptography in IoT Networks: A Survey. Future Generation Computer Systems, 129, 77-89. [Google Scholar] [CrossRef]
|
|
[10]
|
李进. 基于物理不可克隆函数的芯片安全技术研究[D]: [硕士学位论文]. 成都: 电子科技大学, 2022.
|
|
[11]
|
Johnson, R., Molnar, D., Song, D. and Wagner, D. (2002) Homomorphic Signature Schemes. In: Lecture Notes in Computer Science, Springer, 244-262. [Google Scholar] [CrossRef]
|
|
[12]
|
Zhou, X., Zhou, T., Tian, Y., Zhong, W. and Yang, X. (2024) Linearly Homo-morphic Signature Scheme with High-Signature Efficiency and Its Application in IoT. IEEE Internet of Things Journal, 11, 38126-38136. [Google Scholar] [CrossRef]
|
|
[13]
|
Chen, W., Lei, H. and Qi, K. (2016) Lattice-Based Linearly Homomorphic Sig-natures in the Standard Model. Theoretical Computer Science, 634, 47-54. [Google Scholar] [CrossRef]
|
|
[14]
|
Cash, D., Hofheinz, D., Kiltz, E. and Peikert, C. (2012) Bonsai Trees, or How to Delegate a Lattice Basis. Journal of Cryptology, 25, 601-639. [Google Scholar] [CrossRef]
|
|
[15]
|
Boneh, D. and Freeman, D.M. (2011) Homomorphic Signatures for Polynomial Functions. In: Lecture Notes in Computer Science, Springer, 149-168. [Google Scholar] [CrossRef]
|
|
[16]
|
Léo, D., Eamonn, W., Ludo, N.P., et al. (2022) Hawk: Module LIP makes Lattice Signatures Fast, Compact and Simple.
http://eprint.iacr.org/2022/1155
|
|
[17]
|
Léo, D.S. and Wessel, V.W. (2021) On the Lattice Isomorphism Problem, Quadratic Forms, Remarkable Lattices, and Cryptography. Lecture Notes in Computer Science, 13277, 643-673. [Google Scholar] [CrossRef]
|
|
[18]
|
Jackson, K.A., Miller, C.A. and Wang, D. (2024) Evaluating the Security of Crystals-Dilithium in the Quantum Random Oracle Model. In: Lecture Notes in Computer Science, Springer, 418-446. [Google Scholar] [CrossRef]
|
|
[19]
|
Babai, L. (1986) On Lovász’ Lattice Reduction and the Nearest Lattice Point Problem. Combinatorica, 6, 1-13. [Google Scholar] [CrossRef]
|