Post-quantum cryptography

Results: 155



#Item
101Mathematics / Public-key cryptography / Error detection and correction / Algebra / Post-quantum cryptography / McEliece cryptosystem / Goppa code / Niederreiter cryptosystem / Reed–Solomon error correction / Coding theory / Abstract algebra / Finite fields

Wild McEliece Incognito Daniel J. Bernstein1 , Tanja Lange2 , and Christiane Peters3 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-09-15 08:54:20
102Electronic commerce / Hidden Field Equations / RSA / QUAD / Key / Cryptographic hash function / Polynomial / Cryptography / Public-key cryptography / Post-quantum cryptography

Multivariate Quadratic Hash Jintai Ding*, Bo-yin Yang** University of Cincinnati* Technical University of Darmstadt* Institute of Information Science, Academia Sinica**

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-12-04 11:51:29
103Post-quantum cryptography / Linear algebra / NTRUSign / GGH signature scheme / GGH encryption scheme / Lattice reduction / Lattice / Parallelepiped / Vector space / Cryptography / Algebra / Mathematics

Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Phong Q. Nguyen?1 and Oded Regev??2 ´ CNRS & Ecole normale sup´erieure, DI, 45 rue d’Ulm, 75005 Paris, France.

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 01:06:09
104Lattice points / Computational number theory / Lattice problem / Lattice-based cryptography / Lattice / Ideal lattice cryptography / NTRUSign / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Reciprocal lattice / Cryptography / Mathematics / Post-quantum cryptography

Lattice-based Cryptography Oded Regev? Tel Aviv University, Israel Abstract. We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
105Learning with errors / Machine learning / Diffie–Hellman key exchange / Transport Layer Security / XTR / Transmission Control Protocol / Onion routing / RSA / Cryptography / Cryptographic protocols / Electronic commerce

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-06 03:15:24
106Lattice / NTRUSign / Learning with errors / Trapdoor function / Gaussian function / Public-key cryptography / Ideal lattice cryptography / Leech lattice / Cryptography / Mathematics / Post-quantum cryptography

How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions Craig Gentry∗ Stanford University [removed]

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2009-08-17 12:04:32
107Post-quantum cryptography / Standards organizations / Public-key cryptography / NTRU / ID-based encryption / Institute of Electrical and Electronics Engineers / Pairing / Cryptography / IEEE standards / IEEE P1363

IEEE P1363.3: Standard for Identity-Based Cryptographic Techniques using Pairings CALL FOR SUBMISSIONS Contributions are requested for the IEEE P1363.3 project, "Standard for Identity-Based Cryptographic Techniques usin

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:53:33
108McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
109Group-based cryptography / McEliece cryptosystem / Cryptanalysis / Index of cryptography articles / Homomorphic encryption / Cryptography / Public-key cryptography / Post-quantum cryptography

Some results in group-based cryptography Ciaran Mullan Technical Report RHUL–MA–2012–1

Add to Reading List

Source URL: www.ma.rhul.ac.uk

Language: English - Date: 2012-01-12 06:55:53
110Lattice-based cryptography / Homomorphic encryption / Symposium on Theory of Computing / International Cryptology Conference / Symposium on Foundations of Computer Science / Asiacrypt / Oblivious transfer / Eurocrypt / Indocrypt / Cryptography / Formal sciences / Post-quantum cryptography

Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-02 00:24:31
UPDATE