|
[1]
|
Shamir, A. (1985) Identity-Based Cryptosystems and Signature schemes. In: Blakley, G.R. and Chaum, D., Eds., Advances in Cryptology: Proceedings of CRYPTO’84, Springer, Berlin, 47-53. [Google Scholar] [CrossRef]
|
|
[2]
|
Boneh, D. and Franklin, M. (2001) Identity-Based Encryption from the Weil Pairing. Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, 19-23 August 2001, 213-229. [Google Scholar] [CrossRef]
|
|
[3]
|
陈晓, 程朝晖, 张振峰, 等. GB/T 38635.2-2020, 信息安全技术SM9标识密码算法第2部分: 算法[S]. 2020.
|
|
[4]
|
王小云, 李峥, 王永传, 等. GB/T 32905-2016, 信息安全技术SM3密码杂凑算法[S]. 2016.
|
|
[5]
|
Fouque, P.A., Hoffstein, J., Kirchner, P., et al. (2018) FALCON: Fast-Fourier Lattice-Based Compact Signatures over NTRU. https://falcon-sign.info/falcon.pdf
|
|
[6]
|
王圣宝, 周鑫, 文康, 翁柏森. 适用于智能电网的三方密钥交换协议[J]. 通信学报, 2023, 44(2): 210-218.
|
|
[7]
|
Burrows, M., Abadi, M. and Needham, R. (1990) A Logic of Authentication. ACM Transactions on Computer Systems (TOCS), 8, 18-36. [Google Scholar] [CrossRef]
|
|
[8]
|
张敏, 许春香, 张建华. 无人机网络中基于多因子的认证密钥协商协议研究[J]. 信息网络安全, 2022, 22(9): 21-30.
|
|
[9]
|
Shor, P.W. (1999) Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Review, 41, 303-332. [Google Scholar] [CrossRef]
|
|
[10]
|
梁敏, 罗宜元, 刘凤梅. 抗量子计算对称密码研究进展概述[J]. 密码学报, 2021, 8(6): 925-947. [Google Scholar] [CrossRef]
|
|
[11]
|
宋昭阳, 王一诺, 王浩文, 马鸿洋. 基于Hopfield网络“伪吸引子”与交替量子随机行走的抗攻击彩色图像加密方案[J/OL]. 电子学报: 1-13. http://kns.cnki.net/kcms/detail/11.2087.tn.20230330.0928.008.html, 2023-04-11.
|
|
[12]
|
吕述望, 李大为, 邓开勇, 等. GB/T 32907-2016, 信息安全技术SM4分组密码算法[S]. 2016.
|
|
[13]
|
何烜, 王红军, 袁泉. 可证明安全的射频识别双向认证协议[J]. 空军工程大学学报(自然科学版), 2018, 19(5): 41-46.
|
|
[14]
|
Gentry, C., Peikert, C. and Vaikuntanathan, V. (2008) Trapdoors for Hard Lattices and New Cryptographic Constructions. Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, 17-20 May 2008, 197-206. [Google Scholar] [CrossRef]
|
|
[15]
|
Damgard, I. (1990) A Design Principle for Hash Functions. In: Brassard, G., Ed., CRYPTO’1989, Springer, Berlin, 416-427. [Google Scholar] [CrossRef]
|
|
[16]
|
Merkle, R.C. (2001) A Certified Digital Signature. In: Brassard, G., Ed., Advances in Cryptology—CRYPTO’89 Proceedings, Springer, New York, 218-238. [Google Scholar] [CrossRef]
|
|
[17]
|
李大为, 冯登国, 陈华, 等. GB/T 32915-2016, 信息安全技术二元序列随机性检测方法[S]. 2016.
|
|
[18]
|
王小云, 于红波. SM3密码杂凑算法[J]. 信息安全研究, 2016, 2(11): 983-994.
|
|
[19]
|
陆成刚, 王庆月. 一次一密理论的再认识[J]. 高校应用数学学报A辑, 2022, 37(4): 426-430. [Google Scholar] [CrossRef]
|