曹元, 陆旭, 吴彦泽, 谢浩东, 乔云凯, 姚恩义… - Journal of Cyber …, 2021 - jcs.iie.ac.cn
… authentication. … cryptography algorithm solicitation (round 2 and 3), outlines the current
main implementation methods of post-quantum encryption algorithms: hash-based, code-based, …