rithm for database search[C]//Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. 1996: 212-219. [5] Bernstein, D.J. (2009). Introduction to post-quantum cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds) Post-Quantum Cryptography. Springer, Berlin, Heidelberg. [6] Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography[J]. Reviews of modern physics, 2002, 74(1): 145. [7] https://csrc.nist.gov/Projects/post-quantum-cryptography/post-quantum-cryptography-standardization [8] https://csrc.nist.gov/News/2022/pqc-candidates-to-be-standardized-and-round-4 [9] https://csrc.nist.gov/News/2023/three-draft-fips-for-post-quantum-cryptography [10] Huelsing, A., Butin, D., Gazdag, S., Rijneveld, J., and A. Mohaisen, "XMSS: eXtended Merkle Signature Scheme", RFC 8391, DOI 10.17487/RFC8391, May 2018, . [11] McGrew, D., Curcio, M., and S. Fluhrer, "Leighton-Micali Hash-Based Signatures", RFC 8554, DOI 10.17487/RFC8554, April 2019, . [12] Chen Y. Quantum Algorithms for Lattice Problems[J]. Cryptology ePrint Archive, 2024. [13] Regev O. On lattices, learning with errors, random linear codes, and cryptography[J]. Journal of the ACM (JACM), 2009, 56(6): 1-40. [14] https://nigelsmart.github.io/LWE.html 本文由 ZAN Team(X 账号 @zan_team)的 Dongni 和 Jiaxing 共同撰写。 来源:金色财经lg...