[1] Li Z, Chitre M, Stojanovic M. Underwater acoustic communications[J]. Nature Reviews Electrical Engi-neering, 2025, 2(2): 83-95.
[2] Zhou Q, Ye Q, Lai C, et al. Cryptography-Based Secure Underwater Acoustic Communication for UUVs: A Re-view[J]. Electronics, 2025, 14(12): 2415.
[3] Jianmin Y, Jiahui W, Gang Q, et al. Review of under-water acoustic communication and network technolo-gy[J]. 电子与信息学报, 2024, 46(1): 1-21.
[4] Rivest R L, Shamir A, Adleman L. A method for ob-taining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120-126.
[5] Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA)[J]. International journal of information security, 2001, 1: 36-63.
[6] Shor P W. Polynomial-time algorithms for prime fac-torization and discrete logarithms on a quantum com-puter[J]. SIAM review, 1999, 41(2): 303-332.
[7] 孙奥,何银,李海波,等. 后量子密码发展综述[J].信息安全与通信保密,2023(9):27-35.
SUN Ao, HE Yin, LI Haibo, et al. A Survey on the Development of Post-Quantum Cryptography[J]. In-formation Security and Communications Priva-cy,2023(9):27-35.
[8] Mansoor K, Afzal M, Iqbal W, et al. Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices[J]. Cluster Computing, 2025, 28(2): 93.
[9] 梁志闯,郑婕妤,赵运磊.NTRU格上高效紧凑密钥封装方案[J].计算机研究与发展,2024,61(04):1049-1069.
Liang Zhichuang, Zheng Jieyu, Zhao Yunlei. An Effi-cient and Compact Key Encapsulation Mechanism Based on NTRU Lattice[J]. Journal of Computer Re-search and Development,2024,61(04):1049-1069.
[10] NIST. Post-Quantum Cryptography Selected Algo-rithms2022[EB/OL].[2023-09-02].https://csrc.nist.gov/ Projects/post quantum cryptography/selected algrithms 2022.
[11] 王洋,沈诗羽,赵运磊,等.基于模格的密钥封装方案的比较分析与优化[J].计算机研究与发展,2020,57(10):2086-2103.
Wang Yang, Shen Shiyu, Zhao Yunlei, et al. Compari-sons and Optimizations of Key Encapsulation Mecha-nisms Based on Module Lattices[J]. Journal of Com-puter Research and Develop-ment,2020,57(10):2086-2103.
[12] Hoffstein J, Pipher J, Silverman J H. NTRU: A ring-based public key cryptosystem[C]//International algorithmic number theory symposium. Berlin, Hei-delberg: Springer Berlin Heidelberg, 1998: 267-288.
[13] Wang B, Lei H, Hu Y. D-NTRU: More efficient and average-case IND-CPA secure NTRU variant[J]. In-formation Sciences, 2018, 438: 15-31.
[14] 梁志闯,赵旭阳,方博越,等.素阶数域上的高效紧凑NTRU密钥封装方案[J].软件学报,2025,36(02):747-775.
Liang Zhichuang, Zhao Xuyang, Fang Boyue, et al. Efficient and Compact NTRU-based Key Encapsulation Mechanism over Large-Galois-group Prime-degree Prime-ideal Number Field[J]. Journal of Soft-ware,2025,36(02):747-775.
[15] 周彦伟,韩宇,徐然,等.具有多接收者的抗泄露匿名密钥封装机制[J].电子学报,2023,51(12):3431-3436.
Zhou Yanwei, Han Yu, Xu Ran, et al. Leakage-Resilient Key Encapsulation Mechanism with Anonymity and Multi-Receiver[J]. Acta Electronica Sinica,2023,51(12):3431-3436.
[16] Qiao Z, Zhu Y, Zhou Y, et al. A continuous leak-age-resilient CCA secure identity-based key encapsu-lation mechanism in the standard model[J]. Journal of Systems Architecture, 2025, 162: 103388.
[17] Kara M, Karampidis K, Panagiotakis S, et al. Light-weight and Efficient Post Quantum Key Encapsulation Mechanism Based on Q-Problem[J]. Electronics, 2025, 14(4): 728.
[18] 郑婕妤,宋振宇,朱浩亮,等.基于NTRU格的密钥封装机制高效软件优化实现[J].计算机研究与发展,2025,62(09):2330-2347.
Zheng Jieyu, Song Zhenyu, Zhu Haoliang, et al. Effi-cient Software Optimization Implementations of NTRU Lattice-Based Key Encapsulation Mecha-nisms[J].Journal of Computer Research and Develop-ment,2025, 62(09):2330-2347.
[19] Seyhan K, Akleylek S. Indistinguishability under adap-tive chosen-ciphertext attack secure dou-ble-NTRU-based key encapsulation mechanism[J]. PeerJ Computer Science, 2023, 9: e1391.
[20] Dent A W. A designer’s guide to KEMs[C]//IMA In-ternational Conference on Cryptography and Coding. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003: 133-151.
[21] 米瑞琪,江浩东,张振峰.基于Kyber公钥加密的高效认证密钥交换协议[J].软件学报,2025,36(10):4430-4443.
Mi RQ, Jiang HD, Zhang ZF. Efficient Authenticated Key Exchange Protocol Based on Kyber Public-key Encryption. Journal of Soft-ware,2025,36(10):4430-4443.
[22] Shaw S, Dutta R. Forward secure offline assisted group key exchange from isogeny-based blinded key encap-sulation mechanism[J]. IEEE Transactions on Infor-mation Theory, 2023, 69(7): 4708-4722.
[23] Raya A, Kumar V, Gangopadhyay S, et al. Efficient Key Encapsulation Mechanisms from Noncommutative NTRU[J]. Computer Networks, 2025: 111704.
[24] Xu M, Li C. An NTRU-Based Certificateless Aggregate Signature Scheme for Underwater Acoustic Communication[J]. IEEE Internet of Things Journal, 2023, 11(6): 10031-10039.
[25] Ochiai H. On spectral efficiency of OFDM signals based on windowing[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2023, 106(5): 752-764
[26] Duman J, Hövelmanns K, Kiltz E, et al. A thorough treatment of highly-efficient NTRU instantia-tions[C]//IACR International Conference on Public-Key Cryptography. Cham: Springer Nature Switzerland, 2023: 65-94.
[27] Don J, Fehr S, Majenz C, et al. Online-extractability in the quantum random-oracle model[C]//Annual Inter-national Conference on the Theory and Applications of Cryptographic Techniques. Cham: Springer Interna-tional Publishing, 2022: 677-706.
[28] Kim J, Park J H. NTRU+: Compact construction of NTRU using simple encoding method[J]. IEEE Trans-actions on Information Forensics and Security, 2023, 18: 4760-4774.
[29] M. Miron-Morin, D. R. Barclay, and J.F. Bousquet, “The oceanographic sensitivity of the acoustic channel in shallow water,” IEEE J. Oceanic Eng., vol. 46, no. 4, pp. 2451-2464, Apr. 2021.
|