Page 427 - 《软件学报》2026年第1期
P. 427

424                                                        软件学报  2026  年第  37  卷第  1  期


                 [98]   van  Hoof  I,  Kirshanova  E,  May  A.  Quantum  key  search  for  ternary  LWE.  In:  Proc.  of  the  12th  Int’l  Conf.  on  Post-quantum
                      Cryptography. Daejeon: Springer, 2021. 117–132. [doi: 10.1007/978-3-030-81293-5_7]
                 [99]   Chen YL, Liu QP, Zhandry M. Quantum algorithms for variants of average-case lattice problems via filtering. In: Proc. of the 41st
                      Annual Int’l Conf. on the Theory and Applications of Cryptographic Techniques. Trondheim: Springer, 2022. 372–401. [doi: 10.1007/
                      978-3-031-07082-2_14]
                 [100]   Chen HT, Chung YH, Hwang V, Liu CT, Yang BY. Algorithmic views of vectorized polynomial multipliers—NTRU prime. In: Proc. of
                      the 24th Int’l Conf. on Applied Cryptography and Network Security. Abu Dhabi: Springer, 2024. 24–46. [doi: 10.1007/978-3-031-54773-
                      7_2]
                 [101]   Peng TC, Cao SJ, Xue R. On quantum query complexities of collision-finding in non-uniform random functions. IACR Cryptology
                      ePrint Archive, 2021.1578.
                 [102]   Dong XY, Sun SW, Shi DP, Gao F, Wang XY, Hu L. Quantum collision attacks on AES-like hashing with low quantum random access
                      memories. In: Proc. of the 26th Int’l Conf. on the Theory and Application of Cryptology and Information Security. Daejeon: Springer,
                      2020. 727–757. [doi: 10.1007/978-3-030-64834-3_25]
                 [103]   Dinur I. Tight time-space lower bounds for finding multiple collision pairs and their applications. In: Proc. of the 39th Annual Int’l
                      Conf. on the Theory and Applications of Cryptographic Techniques. Zagreb: Springer, 2020. 405–434. [doi: 10.1007/978-3-030-45721-
                      1_15]
                 [104]   Zhang SD, Lin XH, Yu Y, Wang WJ. Improved power analysis attacks on Falcon. In: Proc. of the 42nd Annual Int’l Conf. on the
                      Theory and Applications of Cryptographic Techniques. Lyon: Springer, 2023. 565–595. [doi: 10.1007/978-3-031-30634-1_19]
                 [105]   Aggarwal D, Chen YL, Kumar R, Shen YX. Improved classical and quantum algorithms for the shortest vector problem via bounded
                      distance decoding. arXiv:2002.07955, 2020.
                 [106]   Doulgerakis E, Laarhoven T, de Weger B. Finding closest lattice vectors using approximate Voronoi cells. In: Proc. of the 10th Int’l
                      Conf. on Post-quantum Cryptography. Chongqing: Springer, 2019. 3–22. [doi: 10.1007/978-3-030-25510-7_1]
                 [107]   Leporini  R,  Pastorello  D.  Quantum-inspired  classification  based  on  Voronoi  tessellation  and  pretty-good  measurements.  Quantum
                      Reports, 2022, 4(4): 434–441. [doi: 10.3390/quantum4040031]
                 [108]   Cramer R, Ducas L, Peikert C, Regev O. Recovering short generators of principal ideals in cyclotomic rings. In: Proc. of the 35th
                      Annual Int’l Conf. on the Theory and Applications of Cryptographic Techniques. Vienna: Springer, 2016. 559–585. [doi: 10.1007/978-3-
                      662-49896-5_20]

                 附中文参考文献
                  [6]   王小云, 刘明洁. 格密码学研究. 密码学报, 2014, 1(1): 13–27. [doi: 10.13868/j.cnki.jcr.000002]
                  [7]   王潮, 姚皓南, 王宝楠, 胡风, 张焕国, 纪祥敏. 量子计算密码攻击进展. 计算机学报, 2020, 43(9): 1691–1707. [doi: 10.11897/SP.J.
                     1016.2020.01691]
                 [12]   王娅如. 格密码的量子安全性研究 [博士学位论文]. 郑州: 战略支援部队信息工程大学, 2023. [doi: 10.27188/d.cnki.gzjxu.2023.
                     000022]
                 [36]   毕蕾, 路献辉, 王鲲鹏. 格上筛法研究现状与发展趋势. 密码学报, 2021, 8(5): 735–757. [doi: 10.13868/j.cnki.jcr.000474]
                 [47]   董经. NTRU  公钥密码的量子算法分析和量子格筛算法的研究 [硕士学位论文]. 北京: 北京邮电大学, 2021. [doi: 10.26969/d.cnki.
                     gbydu.2021.001999]

                 作者简介
                 曹金政, 博士生, 主要研究领域为后量子密码.
                 罗向阳, 博士, 教授, 博士生导师, 主要研究领域为多媒体安全, 网络安全.
                 陈晓峰, 博士, 教授, 博士生导师, CCF  高级会员, 主要研究领域为公钥密码, 云计算安全, 数据安全.
                 程庆丰, 博士, 教授, 博士生导师, 主要研究领域为公钥密码, 密码协议.
   422   423   424   425   426   427   428   429   430   431   432