[1]Nakamoto S. Bitcoin: A peertopeer electronic cash system[EBOL]. 2008[20230606]. https:bitcoin.orgbitcoin.pdf[2]国务院.“十三五”国家信息化规划[EBOL]. [20230606]. https:www.gov.cnzhengcecontent20161227content_5153411.htm [3]新华社.习近平主持中央政治局第十八次集体学习并讲话[EBOL]. [20230606]. https:www.gov.cnxinwen20191025content_5444957.htm [4]新华社.中华人民共和国国民经济和社会发展第十四个五年规划和2035年远景目标纲要[EBOL]. [20230606]. https:www.gov.cnxinwen20210313content_5592681.htm [5]Kan J, Chen S, Huang X. Improve blockchain performance using graph data structure and parallel mining[C] Proc of the 1st IEEE Int Conf on Hot InformationCentric Networking (HotICN). Piscataway, NJ: IEEE, 2018: 173178 [6]Harvey C R, Moorman C, Toledo M. How blockchain will change marketing as we know it[EBOL]. [20230718]. http:dx.doi.org10.2139ssrn.3257511 [7]Abd ElLatif A A, AbdElAtty B, Mehmood I, et al. Quantuminspired blockchainbased cybersecurity: Securing smart edge utilities in IoTbased smart cities[J]. Information Processing & Management, 2021, 58(4): 102549[8]Bhatia V, Ramkumar K R. An efficient quantum computing technique for cracking RSA using Shor’s algorithm[C] Proc of the 5th IEEE Int Conf on Computing Communication and Automation (ICCCA). Piscataway, NJ: IEEE, 2020: 8994[9]Kumar A, Ottaviani C, Gill S S, et al. Securing the future internet of things with postquantum cryptography[J]. Security and Privacy, 2022, 5(2): e200 [10]Lee W K, Jang K, Song G, et al. Efficient implementation of lightweight hash functions on GPU and quantum computers for IoT applications[J]. IEEE Access, 2022, 10: 5966159674[11]Mosca M. Cybersecurity in an era with quantum computers: Will we be ready[J]. IEEE Security & Privacy, 2018, 16(5): 3841 [12]Ravi P, Chattopadhyay A, Bhasin S. Security and quantum computing: anoverview[C] Proc of the 23rd IEEE Latin American Test Symposium (LATS). Piscataway, NJ: IEEE, 2022: 16 [13]Huang H, Sun X, Xiao F, et al. Blockchainbased eHealth system for auditable EHRs manipulation in cloud environments[J]. Journal of Parallel and Distributed Computing, 2021, 148: 4657 [14]钟锦敏. 基于中间相遇的哈希函数原像攻击[D]. 上海: 上海交通大学, 2011[15]王小云. 区块链的起源性技术[EBOL]. [20230606]. https:www.sohu.coma372366766_120160794 [16]Hasanova H, Baek U, Shin M, et al. A survey on blockchain cybersecurity vulnerabilities and possible countermeasures[J]. International Journal of Network Management, 2019, 29(2): e2060[17]Zoli U G. Cryptocurrency in a globalized world: A comparative analysis of Bitcoin as a financial asset[EBOL]. 2017 [20230606]. http:tesi.luiss.it20947[18]Gibney E. Hello quantum world! Google publishes landmark quantum supremacy claim[J]. Nature, 2019, 574(7779): 461463[19]FernandezCarames T M, FragaLamas P. Towards postquantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks[J]. IEEE Access, 2020, 8: 2109121116[20]田盛平. 基于量子计算的Hash安全性研究[D]. 深圳: 深圳大学, 2020 [21]Grover L K. A fast quantum mechanical algorithm for database search[C] Proc of the 28th Annual ACM Symp on Theory of Computing. New York: ACM, 1996: 212219 [22]Wang X, Lai X, Feng D, et al. Cryptanalysis of the hash functions MD4 and RIPEMD[C] Proc of Int Conf on Advances in CryptologyEurocrypt. Berlin: Springer, 2005: 118 [23]Brassard G, Hyer P, Tapp A. Quantum cryptanalysis of hash and clawfree functions[C] Proc of the 3rd Latin American Symp Campinas. Berlin: Springer, 1998: 163169[24]Stevens H. Hans Peter Luhn and the birth of the hashing algorithm[J]. IEEE Spectrum, 2018, 55(2): 4449 [25]Wenli L, Jitianbai Z. The power consumption analysis of Java card on different cryptographic algorithm[C] Proc of 2020 Int Conf on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE). Piscataway, NJ: IEEE, 2020: 150153 [26]Underwood S. Blockchain beyond bitcoin[J]. Communications of the ACM, 2016, 59(11): 1517[27]Kiktenko E O, Pozhar N O, Anufriev M N, et al. Quantumsecured blockchain[J]. Quantum Science and Technology, 2018, 3(3): 035004[28]Krawczyk H. LFSRbased hashing and authentication[C] Proc of Annual Int Cryptology Conf. Berlin: Springer, 1994: 129139[29]Nevelsteen W, Preneel B. Software performance of universal hash functions[C] Proc of Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 1999: 2441 [30]Wen X J, Chen Y Z, Fan X C, et al. Quantum blockchain system[J]. Modern Physics Letters B, 2021, 35(20): 2150343[31]Hilbert D. Mathematical problems[J]. Bulletin of the American Mathematical Society, 2000, 37(4): 407436[32]Krendelev S, Sazonova P. Parametric hash function resistant to attack by quantum computer[C] Proc of 2018 Federated Conf on Computer Science and Information Systems (FedCSIS). Piscataway, NJ: IEEE, 2018: 387390
|