Page 427 - 《软件学报》2026年第1期
P. 427
424 软件学报 2026 年第 37 卷第 1 期
[98] van Hoof I, Kirshanova E, May A. Quantum key search for ternary LWE. In: Proc. of the 12th Int’l Conf. on Post-quantum
Cryptography. Daejeon: Springer, 2021. 117–132. [doi: 10.1007/978-3-030-81293-5_7]
[99] Chen YL, Liu QP, Zhandry M. Quantum algorithms for variants of average-case lattice problems via filtering. In: Proc. of the 41st
Annual Int’l Conf. on the Theory and Applications of Cryptographic Techniques. Trondheim: Springer, 2022. 372–401. [doi: 10.1007/
978-3-031-07082-2_14]
[100] Chen HT, Chung YH, Hwang V, Liu CT, Yang BY. Algorithmic views of vectorized polynomial multipliers—NTRU prime. In: Proc. of
the 24th Int’l Conf. on Applied Cryptography and Network Security. Abu Dhabi: Springer, 2024. 24–46. [doi: 10.1007/978-3-031-54773-
7_2]
[101] Peng TC, Cao SJ, Xue R. On quantum query complexities of collision-finding in non-uniform random functions. IACR Cryptology
ePrint Archive, 2021.1578.
[102] Dong XY, Sun SW, Shi DP, Gao F, Wang XY, Hu L. Quantum collision attacks on AES-like hashing with low quantum random access
memories. In: Proc. of the 26th Int’l Conf. on the Theory and Application of Cryptology and Information Security. Daejeon: Springer,
2020. 727–757. [doi: 10.1007/978-3-030-64834-3_25]
[103] Dinur I. Tight time-space lower bounds for finding multiple collision pairs and their applications. In: Proc. of the 39th Annual Int’l
Conf. on the Theory and Applications of Cryptographic Techniques. Zagreb: Springer, 2020. 405–434. [doi: 10.1007/978-3-030-45721-
1_15]
[104] Zhang SD, Lin XH, Yu Y, Wang WJ. Improved power analysis attacks on Falcon. In: Proc. of the 42nd Annual Int’l Conf. on the
Theory and Applications of Cryptographic Techniques. Lyon: Springer, 2023. 565–595. [doi: 10.1007/978-3-031-30634-1_19]
[105] Aggarwal D, Chen YL, Kumar R, Shen YX. Improved classical and quantum algorithms for the shortest vector problem via bounded
distance decoding. arXiv:2002.07955, 2020.
[106] Doulgerakis E, Laarhoven T, de Weger B. Finding closest lattice vectors using approximate Voronoi cells. In: Proc. of the 10th Int’l
Conf. on Post-quantum Cryptography. Chongqing: Springer, 2019. 3–22. [doi: 10.1007/978-3-030-25510-7_1]
[107] Leporini R, Pastorello D. Quantum-inspired classification based on Voronoi tessellation and pretty-good measurements. Quantum
Reports, 2022, 4(4): 434–441. [doi: 10.3390/quantum4040031]
[108] Cramer R, Ducas L, Peikert C, Regev O. Recovering short generators of principal ideals in cyclotomic rings. In: Proc. of the 35th
Annual Int’l Conf. on the Theory and Applications of Cryptographic Techniques. Vienna: Springer, 2016. 559–585. [doi: 10.1007/978-3-
662-49896-5_20]
附中文参考文献
[6] 王小云, 刘明洁. 格密码学研究. 密码学报, 2014, 1(1): 13–27. [doi: 10.13868/j.cnki.jcr.000002]
[7] 王潮, 姚皓南, 王宝楠, 胡风, 张焕国, 纪祥敏. 量子计算密码攻击进展. 计算机学报, 2020, 43(9): 1691–1707. [doi: 10.11897/SP.J.
1016.2020.01691]
[12] 王娅如. 格密码的量子安全性研究 [博士学位论文]. 郑州: 战略支援部队信息工程大学, 2023. [doi: 10.27188/d.cnki.gzjxu.2023.
000022]
[36] 毕蕾, 路献辉, 王鲲鹏. 格上筛法研究现状与发展趋势. 密码学报, 2021, 8(5): 735–757. [doi: 10.13868/j.cnki.jcr.000474]
[47] 董经. NTRU 公钥密码的量子算法分析和量子格筛算法的研究 [硕士学位论文]. 北京: 北京邮电大学, 2021. [doi: 10.26969/d.cnki.
gbydu.2021.001999]
作者简介
曹金政, 博士生, 主要研究领域为后量子密码.
罗向阳, 博士, 教授, 博士生导师, 主要研究领域为多媒体安全, 网络安全.
陈晓峰, 博士, 教授, 博士生导师, CCF 高级会员, 主要研究领域为公钥密码, 云计算安全, 数据安全.
程庆丰, 博士, 教授, 博士生导师, 主要研究领域为公钥密码, 密码协议.

