Post-Quantum Lattice-Based Cryptography Implementations: A Survey. Nejatollahi, H., Dutt, N. D., Ray, S., Regazzoni, F., Banerjee, I., & Cammarota, R. ACM Comput. Surv., 51(6):129:1–129:41, 2019. Paper doi bibtex 1 download @article{DBLP:journals/csur/NejatollahiDRRB19,
author = {Hamid Nejatollahi and
Nikil D. Dutt and
Sandip Ray and
Francesco Regazzoni and
Indranil Banerjee and
Rosario Cammarota},
title = {Post-Quantum Lattice-Based Cryptography Implementations: {A} Survey},
journal = {{ACM} Comput. Surv.},
volume = {51},
number = {6},
pages = {129:1--129:41},
year = {2019},
url = {https://doi.org/10.1145/3292548},
doi = {10.1145/3292548},
timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/csur/NejatollahiDRRB19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 1
{"_id":"pH4CMxWPCeHQnXCd7","bibbaseid":"nejatollahi-dutt-ray-regazzoni-banerjee-cammarota-postquantumlatticebasedcryptographyimplementationsasurvey-2019","author_short":["Nejatollahi, H.","Dutt, N. D.","Ray, S.","Regazzoni, F.","Banerjee, I.","Cammarota, R."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Hamid"],"propositions":[],"lastnames":["Nejatollahi"],"suffixes":[]},{"firstnames":["Nikil","D."],"propositions":[],"lastnames":["Dutt"],"suffixes":[]},{"firstnames":["Sandip"],"propositions":[],"lastnames":["Ray"],"suffixes":[]},{"firstnames":["Francesco"],"propositions":[],"lastnames":["Regazzoni"],"suffixes":[]},{"firstnames":["Indranil"],"propositions":[],"lastnames":["Banerjee"],"suffixes":[]},{"firstnames":["Rosario"],"propositions":[],"lastnames":["Cammarota"],"suffixes":[]}],"title":"Post-Quantum Lattice-Based Cryptography Implementations: A Survey","journal":"ACM Comput. Surv.","volume":"51","number":"6","pages":"129:1–129:41","year":"2019","url":"https://doi.org/10.1145/3292548","doi":"10.1145/3292548","timestamp":"Sat, 05 Sep 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/csur/NejatollahiDRRB19.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/csur/NejatollahiDRRB19,\n author = {Hamid Nejatollahi and\n Nikil D. Dutt and\n Sandip Ray and\n Francesco Regazzoni and\n Indranil Banerjee and\n Rosario Cammarota},\n title = {Post-Quantum Lattice-Based Cryptography Implementations: {A} Survey},\n journal = {{ACM} Comput. Surv.},\n volume = {51},\n number = {6},\n pages = {129:1--129:41},\n year = {2019},\n url = {https://doi.org/10.1145/3292548},\n doi = {10.1145/3292548},\n timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/csur/NejatollahiDRRB19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Nejatollahi, H.","Dutt, N. D.","Ray, S.","Regazzoni, F.","Banerjee, I.","Cammarota, R."],"key":"DBLP:journals/csur/NejatollahiDRRB19","id":"DBLP:journals/csur/NejatollahiDRRB19","bibbaseid":"nejatollahi-dutt-ray-regazzoni-banerjee-cammarota-postquantumlatticebasedcryptographyimplementationsasurvey-2019","role":"author","urls":{"Paper":"https://doi.org/10.1145/3292548"},"metadata":{"authorlinks":{}},"downloads":1},"bibtype":"article","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","dataSources":["H8x2obrhjRLyjakpF","ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5","Wsv2bQ4jPuc7qme8R"],"keywords":[],"search_terms":["post","quantum","lattice","based","cryptography","implementations","survey","nejatollahi","dutt","ray","regazzoni","banerjee","cammarota"],"title":"Post-Quantum Lattice-Based Cryptography Implementations: A Survey","year":2019,"downloads":1}