|
[1] J. B. Kenney, “Dedicated Short-Range Communications (DSRC) Standards in the United States,” Proceedings of the IEEE, Vol. 99, No. 7, pp. 1162-1182, Jul. 2011. [2] D. He, S. Zeadally, B. Xu, and X. Huang, “An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks,” IEEE Transactions on Information Forensics and Security, Vol. 10, No. 12, pp. 2681-2691, Dec. 2015. [3] Q. Li, D. He, Z. Yang, Q. Xie, and K.-K. R. Choo, “Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network,” IEEE Transactions on Vehicular Technology, Vol. 71, No. 4, pp. 4336-4347, Apr. 2022. [4] M. Raya and J.-P. Hubaux, “Securing vehicular ad hoc networks,” J. Comput. Security, Vol. 15, No. 1, pp. 39–68, Jan. 2007. [5] J. Zhang, J. Cui, H. Zhong, Z. Chen and L. Liu, “PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks,” IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 2, pp. 722-735, Mar. 2021 [6] V. Mavroeidis, K. Vishi, M. D. Zych, and A. Jøsang, “The Impact of Quantum Computing on Present Cryptography,” arXiv, Mar. 2018. [7] A. Hülsing, “WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes,” Cryptology ePrint Archive, Paper 2017/965, Oct. 2017. [8] M. J. Dworkin, “SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions,” National Institute of Standards and Technology, Jul. 2015. [9] J. Kelsey, S. Change, and R. Perlner, “SHA-3 derived functions: cSHAKE, KMAC, TupleHash and ParallelHash,” National Institute of Standards and Technology, Dec. 2016. [10] MIRACL Ltd., “The MIRACL Core Cryptographic Library,” Available Online: https://github.com/miracl/core, Jun. 2019. [11] J. G. Underhill, “Quantum Secure Cryptographic library in C,” Available Online: https://github.com/Steppenwolfe65/QSC, Jan. 2018. [12] Victor Shoup, “NTL: A Library for doing Number Theory,” Available Online: https://www.shoup.net/, Jun. 2021.
|