Post-quantum cryptography

Results: 155



#Item
91Post-quantum cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash tree / Hash function / Electronic signature / Public key infrastructure / Digital Signature Algorithm / Cryptography / Public-key cryptography / Key management

Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:37:18
92NTRUSign / Lattice-based cryptography / NTRU / Lattice problem / RSA / Lattice / Digital signature / Learning with errors / Ideal lattice cryptography / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 13:38:18
93Diffie–Hellman key exchange / Learning with errors / XTR / Onion routing / Homomorphic encryption / Transport Layer Security / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:34:21
94McEliece cryptosystem / Post-quantum cryptography / Ciphertext / Chosen-ciphertext attack / RSA / Lattice problem / Cryptanalysis / Niederreiter cryptosystem / Rabin cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
95Algebraic geometry / QUAD / Polynomials / Hidden Field Equations / XTR / System of polynomial equations / Quadratic / NP / XSL attack / Mathematics / Finite fields / Post-quantum cryptography

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems ⋆ Takanori Yasuda1 , Xavier Dahan1,6 , Yun-Ju Huang1,2 , Tsuyoshi Takagi1,3,4 , and Kouichi Sakurai1,5 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 06:14:31
96Key management / Public-key cryptography / Precomputation / Hash tree / Post-quantum cryptography / Digital signature / Quantum digital signature / SHA-2 / Collision resistance / Cryptography / Cryptographic hash functions / Hashing

Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont Secure Embedded Systems Center for Embedded Systems for Critical Applications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 21:36:12
97Post-quantum cryptography / Cyberwarfare / Applied mathematics / Security / Public-key cryptography / Electronic commerce / McEliece cryptosystem

Toward Secure Implementation of McEliece Decryption Mariya Georgieva1 and Fr´ed´eric de Portzamparc1,2,3,4 Gemalto, 6 rue de la Verrerie 92190, Meudon, France1 INRIA, Paris-Rocquencourt Center2 , UPMC Univ Paris 06, UM

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 08:28:15
98Public-key cryptography / Finite fields / Electronic commerce / McEliece cryptosystem / Post-quantum cryptography / Goppa code / Linear code / Reed–Solomon error correction / Forward error correction / Cryptography / Coding theory / Error detection and correction

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40
99Quantum information science / McEliece cryptosystem / Cryptography / Post-quantum cryptography / Quantum cryptography

Accepted Papers-Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-17 11:08:13
100Key size / Lattice problem / Quantum computer / Cipher / Post-quantum cryptography / Symmetric-key algorithm / Public-key cryptography / Cryptanalysis / Key / Cryptography / CRYPTREC / Lattice-based cryptography

NEWS MAR[removed]No[removed]

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2014-08-13 01:18:16
UPDATE