56 References 13. G. Brassard, P. Høyer, and A. Tapp. »Quantum cryptanalysis of hash and clawfree functions«. In: Theoretical Informatics—LATIN’98. Ed. by C. L. Lucchesi and A. V. Moura. Vol. 1380. LNCS. Springer, 1998, pp. 163–169 (cit. on pp. 15, 31). 14. E. Brickell. Intel Strategy for Post Quantum Crypto. https://pqcrypto2016.jp/data/ BrickellPost_Quantum_StrategyPQC_ 2016_final.pdf. Invited talk at Post- Quantum Cryptography—PQCrypto 2016. 2016 (cit. on p. 40). 15. L. G. Bruinderink, A. Hülsing, T. Lange, and Y. Yarom. »Flush, Gauss, and Reload—A Cache Attack on the BLISS Lattice-Based Signature Scheme«. In: Cryptographic Hardware and Embedded Systems—CHES 2016. Ed. by B. Gierlichs and A. Y. Poschmann. Vol. 9813. LNCS. Springer, 2016, pp. 323–345 (cit. on p. 30). 16. J. Buchmann, E. Dahmen, and A. Hülsing.»XMSS—A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions«. In: Post-Quantum Cryptography—PQCrypto 2011. Ed. by B.-Y. Yang. Vol. 7071. LNCS. Springer, 2011, pp. 117–129(cit. on p. 32). 17. D. Butin, A. Hülsing, A. Mohaisen, and S.-L. Gazdag. XMSS: Extended Hash-Based Signatures. Internet-Draft draft-irtf-cfrg-xmss-hash-based-signatures-07. Work in Progress. Internet Engineering Task Force, 2016 (cit. on p. 32). 18. L. Chen, S. Jordan, Y.K. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone. Report on Post-Quantum Cryptography. DRAFT NISTIR 8105. NIST, 2016 (cit. on p. 40). 19. C.-M. Cheng, T. Chou, R. Niederhagen, and B.-Y. Yang. »Solving Quadratic Equations with XL on Parallel Architectures«. In: Cryptographic Hardware and Embedded Systems—CHES 2012. Ed. by E. Prouff and P. Schaumont. Vol. 7428. LNCS. Springer, 2012, pp. 356–373 (cit. on p. 34). 20. A. Childs, D. Jao, and V. Soukharev. »Constructing Elliptic Curve Isogenies in Quantum Subexponential Time«. In: Journal of Mathematical Cryptology 8.1 (2014). arXiv:1012.4019, pp. 1–29 (cit. on p. 36). 21. C. Costello, P. Longa, and M. Naehrig. »Efficient Algorithms for Supersingular Isogeny Diffie-Hellman«. In: Advances in Cryptology—CRYPTO 2016. Ed. by M. Robshaw and J. Katz. Vol. 9814. LNCS. Springer, 2016, pp. 572–601 (cit. on p. 36). 22. N. T. Courtois,M. Finiasz, and N. Sendrier. »How to Achieve aMcEliece-Based Digital Signature Scheme«. In: Advances in Cryptology—ASIACRYPT 2001. Ed. by C. Boyd. Vol. 2248. LNCS. Springer, 2001, pp. 157–174 (cit. on p. 28). 23. D. Deutsch. »Quantum Theory, the Church-Turing Principle and the Universal Quantum Computer«. In: Proceedings of the Royal Society of London A:Mathematical, Physical and Engineering Sciences 400.1818 (1985), pp. 97–117 (cit. on p. 14). 24. J. Ding and J. E. Gower. »Inoculating multivariate schemes against differential attacks«. In: International Workshop on Public Key Cryptography. Vol. 3958. LNCS. Springer, 2006, pp. 290–301 (cit. on p. 35). 25. J. Ding and D. Schmidt. »Rainbow, a New Multivariable Polynomial Signature Scheme«. In: Applied Cryptography and Network Security — ACNS 2005. Ed. by J. Ioannidis, A. Keromytis, andM. Yung. Vol. 3531. LNCS. Springer, 2005, pp. 164–175 (cit. on p. 35).
PQC_for_Dummies
To see the actual publication please follow the link above