[1] Shor P. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5): 1484-1509
[2] Grover K. A fast quantum mechanical algorithm for database search[C] // Proc of the 28th Annual ACM Symp on the Theory of Computing, (STOC), 1996
[3] Frankel S, Krishnan S. RFC 6071: IP security (IPsec) and internet key exchange (IKE) document roadmap[EB/OL]. 2011-02[2020-05-20]. https://tools.ietf.org/html/rfc6071
[4] Rescorla E. RFC 8446: The transport layer security (TLS) protocol version 1.3[EB/OL]. 2018-08[2020-05-20]. https://tools.ietf.org/html/rfc8446
[5] 3GPP. TR 33.841 V16.0.0: Study on the support of 256-bit algorithms for 5G[EB/OL]. (2018-12-18)[2020-05-21]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3422
[6] 3GPP. TS 33.501 V16.1.0: Security architecture and procedures for 5G System[EB/OL]. (2019-12-31)[2020-05-21]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169
[7] 3GPP. TS 33.401 V16.0.0: 3GPP system architecture evolution (SAE); Security architecture[EB/OL]. (2019-09-25)[2020-05-21]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2296
[8] Rupprecht D, Kohls K, Holz T, et al. Breaking LTE on layer two[C] // Proc of 2019 IEEE Symp on Security and Privacy (SP). Piscataway,NJ:IEEE, 2019: 1121-1136
[9] Ekdahl P, Thomas J, Maximov A, et al. A new SNOW stream cipher called SNOW-V[J]. IACR Trans on Symmetric Cryptology 2019(3): 1-42
[10] 3GPP. TS 35.206 V15.0.0: 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification[EB/OL]. (2018-10-23)[2020-05-22]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2391
[11] 3GPP. TS 35.231 V15.0.0: Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification[EB/OL].(2018-06-22)[2020-05-22]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2402
[12] Jones M, Bradley J, Sakimura M. RFC 7519: JSON web token (JWT)[EB/OL]. 2015-05[2020-05-20]. https://tools.ietf.org/html/rfc7519
[13] Drucker N , Gueron S. Fast constant time implementations of ZUC-256 on x86 CPUs[C] //Proc of the 16th IEEE Annual Consumer Communications & Networking Conf (CCNC). Piscataway,NJ:IEEE, 2019: 1-7