| [1] |
RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126.
|
| [2] |
MILLER V S. Use of elliptic curves in cryptography[C]// Conference on the Theory and Application of Cryptographic Techniques. Heidelberg: Springer, 1985:417-426.
|
| [3] |
KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177):203-209.
|
| [4] |
SHOR P W. Algorithms for quantum computation: discrete logarithms and factoring[C]// Proceedings 35th Annual Symposium on Foundations of Computer Science. Santa Fe: IEEE, 1994:124-134.
|
| [5] |
GROVER L K. A fast quantum mechanical algorithm for database search[C]// Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing. New York: ACM, 1996:212-219.
|
| [6] |
ZHANG M, WANG J, LAI J, et al. Research on development progress and test evaluation of post-quantum cryptography[J]. Entropy, 2025, 27(2):212.
|
| [7] |
KUMAR M, MONDAL B. Study on implementation of shor’s factorization algorithm on quantum computer[J]. SN Computer Science, 2024, 5(4):413.
|
| [8] |
ZHANG D, WANG H, LI S, et al. Progress in the prime factorization of large numbers[J]. The Journal of Supercomputing, 2024, 80(8):11382-11400.
|
| [9] |
KOCHER P C. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[C]// Advances in Cryptology-CRYPTO’96:16th Annual International Cryptology Conference Santa Barbara, California. Heidelberg: Springer, 1996:104-113.
|
| [10] |
冯晓宁, 吴洪宇. 对称密码体制的量子攻击[J]. 应用科学学报, 2024, 42(1):39-52.
|
| [11] |
赖俊森, 赵文玉, 张海懿. 量子计算信息安全威胁与应对策略分析[J]. 信息通信技术与政策, 2024, 50(7):24-29.
doi: 10.12267/j.issn.2096-5931.2024.07.004
|
| [12] |
中国信息通信研究院. 量子信息技术发展与应用研究报告(2024年)[R], 2024.
|