1 |
BERNSTEIN D J, LANGE T. Post-quantum cryptography [J]. Nature, 2017, 549(7671): 188-194. 10.1038/nature23461
|
2 |
ALAGIC G, ALPERIN-SHERIFF J, APON D, et al. Status report on the second round of the NIST post-quantum cryptography standardization process: NISTIR 8309 [R]. Gaithersburg: National Institute of Standards and Technology, 2020. 10.6028/nist.ir.8240
|
3 |
MCELIECE R J. A public-key cryptosystem based on algebraic coding theory: DSN progress report 42-44 [R]. Pasadena: Jet Propulsion Laboratory, 1978: 114-116.
|
4 |
GALLAGER R. Low-density parity-check codes [J]. IRE Transactions on Information Theory, 1962, 8(1): 21-28. 10.1109/tit.1962.1057683
|
5 |
MONICO C, ROSENTHAL J, SHOKROLLAHI A. Using low density parity check codes in the McEliece cryptosystem [C]// Proceedings of the 2000 IEEE International Symposium on Information Theory. Piscataway: IEEE, 2000: 215. 10.1109/isit.2000.866513
|
6 |
BALDI M, CHIARALUCE F, GARELLO R, et al. Quasi-cyclic low-density parity-check codes in the McEliece cryptosystem [C]// Proceedings of the 2007 IEEE International Conference on Communications. Piscataway: IEEE, 2007: 951-956. 10.1109/icc.2007.161
|
7 |
MISOCZKI R, TILLICH J P, SENDRIER N, et al. MDPC-McEliece: new McEliece variants from moderate density parity-check codes [C]// Proceedings of the 2013 IEEE International Symposium on Information Theory. Piscataway: IEEE, 2013: 2069-2073. 10.1109/isit.2013.6620590
|
8 |
GUO Q, JOHANSSON T, STANKOVSKI P. A key recovery attack on MDPC with CCA security using decoding errors [C]// Proceedings of the 2016 International Conference on the Theory and Application of Cryptology and Information Security, LNCS10031. Berlin: Springer, 2016: 789-815.
|
9 |
BYERS J W, LUBY M, MITZENMACHER M, et al. A digital fountain approach to reliable distribution of bulk data [J]. ACM SIGCOMM Computer Communication Review, 1998, 28(4): 56-67. 10.1145/285243.285258
|
10 |
LUBY M. LT codes [C]// Proceedings of the 2002 43rd Annual IEEE Symposium on Foundations of Computer Science. Piscataway: IEEE, 2002: 271-280. 10.1109/sfcs.2002.1181950
|
11 |
SHOKROLLAHI A. Raptor codes [J]. IEEE Transactions on Information Theory, 2006, 52(6): 2551-2567. 10.1109/tit.2006.874390
|
12 |
ZHANG M R. Major automatic repeat request protocols generalization and future develop direction [C]// Proceedings of the 6th International Conference on Information Management, Innovation Management and Industrial Engineering. Piscataway: IEEE, 2013: 5-8. 10.1109/iciii.2013.6703196
|
13 |
BALDI M, BIANCHI M, CHIARALUCE F. Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes [J]. IET Information Security, 2013, 7(3): 212-220. 10.1049/iet-ifs.2012.0127
|
14 |
MUKHERJEE A. Hybrid ARQ schemes [M/OL]// TAFAZOLLI R, CHATZIMISIOS P, WANG C L. Wiley 5G Ref: The Essential 5G Reference Online. (2020-05-16) [2020-11-23]..
|
15 |
EATON E, LEQUESNE M, PARENT A, et al. QC-MDPC: a timing attack and a CCA2 KEM [C]// Proceedings of the 2018 International Conference on Post-Quantum Cryptography, LNCS10786. Cham: Springer, 2018: 47-76.
|
16 |
李艳霞.无线通信中的喷泉码技术研究[D].成都:电子科技大学,2019:23-24.
|
|
LI Y X. Research on fountain codes technology in wireless communication [D]. Chengdu: University of Electronic Science and Technology of China, 2019:23-24.
|
17 |
孙玉情.QC-MDPC McEliece密码体制研究[D].西安:西安电子科技大学,2019:35-44. 10.19734/j.issn.1001-3695.2018.04.0349
|
|
SUN Y Q. Research on QC-MDPC McEliece cryptosystem [D]. Xi’an: Xidian University, 2019:35-44. 10.19734/j.issn.1001-3695.2018.04.0349
|
18 |
MAY A, MEURER A, THOMAE E. Decoding random linear codes in Õ(20.054n) [C]// Proceedings of the 2011 International Conference on the Theory and Application of Cryptology and Information Security, LNCS7073. Berlin: Springer, 2011: 107-124.
|
19 |
OTMANI A, TILLICH J P, DALLOT L. Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes [J]. Mathematics in Computer Science, 2010, 3(2): 129-140. 10.1007/s11786-009-0015-8
|
20 |
BARDET M, DRAGOI V, LUQUE J G, et al. Weak keys for the quasi-cyclic MDPC public key encryption scheme [C]// Proceedings of the 2016 International Conference on Cryptology in Africa, LNCS9646. Cham: Springer, 2016: 346-367.
|
21 |
FABŠIČ T, HROMADA V, STANKOVSKI P, et al. A reaction attack on the QC-LDPC McEliece cryptosystem [C]// Proceedings of the 2017 International Workshop on Post-Quantum Cryptography, LNCS10346. Cham: Springer, 2017: 51-68.
|
22 |
BARRETO P S L M, GUERON S, GÜNEYSU T, et al. CAKE: Code-based Algorithm for Key Encapsulation [C]// Proceedings of the 2017 IMA International Conference on Cryptography and Coding, LNCS10655. Cham: Springer, 2017: 207-226.
|
23 |
ARAGON N, BARRETO P, BETTAIEB S, et al. BIKE: bit flipping key encapsulation [EB/OL]. (2017-12-22) [2020-11-23]. .
|
24 |
SENDRIER N, VASSEUR V. About low DFR for QC-MDPC decoding [C]// Proceedings of the 2020 International Conference on Post-Quantum Cryptography, LNCS12100. Cham: Springer, 2020: 20-34.
|