<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Quantum cryptography / Public-key cryptography / Lattice-based cryptography / NTRU / Quantum key distribution / Quantum computing / Elliptic curve cryptography / Key size / BLISS signature scheme / Cryptanalysis
Date: 2016-06-10 06:35:53
Cryptography
Post-quantum cryptography
Quantum cryptography
Public-key cryptography
Lattice-based cryptography
NTRU
Quantum key distribution
Quantum computing
Elliptic curve cryptography
Key size
BLISS signature scheme
Cryptanalysis

Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast

Add to Reading List

Source URL: ctcrypt.ru

Download Document from Source Website

File Size: 1,48 MB

Share Document on Facebook

Similar Documents

Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JST

Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JST

DocID: 1u5WD - View Document

Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.

Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.

DocID: 1tp0D - View Document

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

DocID: 1tgQg - View Document

Summary of the Theory Component of Quantum Key Distribution and  Quantum Cryptography

Summary of the Theory Component of Quantum Key Distribution and Quantum Cryptography

DocID: 1sHBk - View Document

Summary of Implementation Schemes for Quantum Key Distribution and  Quantum Cryptography

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

DocID: 1rArg - View Document