Post-quantum cryptography

Results: 155



#Item
111Finite fields / Electronic commerce / Mathematics / Cyberwarfare / Reed–Solomon error correction / McEliece cryptosystem / Symbol / XTR / Applied mathematics / Public-key cryptography / Post-quantum cryptography / Cryptography

New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC Masao KASAHARA ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-21 23:59:57
112CRYPTREC / Key management / Post-quantum cryptography / Elliptic Curve DSA / Integrated Encryption Scheme / NTRU / Elliptic curve Diffie–Hellman / Digital signature / RSA / Cryptography / Cryptography standards / Public-key cryptography

The CRYPTREC Policy to Evaluate the Submitted Public Key Systems October 10, 2001 Tsutomu Matsumoto Chair, Public-Key Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
113Lattice / Mathematics / Applied mathematics / Security / NTRUEncrypt / Post-quantum cryptography / NTRUSign / NTRU

NTRUSign Introduced December 2001 Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
114NTRU / Cryptosystem / Random oracle / Public-key cryptography / Cryptography / Post-quantum cryptography / Ciphertext indistinguishability

Report on Present State of NTRU Cryptosystem Evaluation (screening evaluation) January 28, 2002 Jun Kogure, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
115Post-quantum cryptography / XSL attack / Key schedule / QUAD / Block cipher / Hidden Field Equations / Differential cryptanalysis / Q / Cipher / Cryptography / Advanced Encryption Standard / Stream ciphers

ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

Add to Reading List

Source URL: www.math.wisc.edu

Language: English - Date: 2004-12-15 08:27:50
116Key management / CRYPTREC / Post-quantum cryptography / Elliptic curve cryptography / Elliptic Curve DSA / NTRU / Integrated Encryption Scheme / Elliptic curve Diffie–Hellman / Digital signature / Cryptography / Cryptography standards / Public-key cryptography

CRYPTREC2001 Report on Present State of Asymmetric-Key Cryptographic Technique Evaluations January 28, 2002 Tsutomu Matsumoto,

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
117Quantum cryptography / Cryptographic protocols / Post-quantum cryptography / Quantum computer / Digital signature / Public key infrastructure / Alice and Bob / Key size / NTRU / Cryptography / Public-key cryptography / Key management

NIST Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-03-26 13:34:11
118Quantum mechanics / Quantum cryptography / Cryptography / Quantum information theory / Quantum computer / Qubit / Quantum Fourier transform / BB84 / Quantum key distribution / Theoretical computer science / Quantum information science / Applied mathematics

Quantum and Post Quantum Cryptography Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France [removed] http://www.math.unicaen.fr/~nitaj

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2012-11-25 08:41:10
119NTRU / Lattice / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / RSA / Polynomial / Cryptography / Post-quantum cryptography / NTRUEncrypt

Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France Email: [removed]

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2011-09-02 16:54:04
120FEAL / Silvio Micali / Leftover hash lemma / Cryptanalysis / Differential cryptanalysis / Post-quantum cryptography / Small subgroup confinement attack / Group-based cryptography / Cryptography / Cryptographic protocols / Oblivious transfer

References 1. ABA Bank Card Standard, "Management and Use of Personal Information Numbers, " Aids from ABA, Catalog no[removed], American Bankers Association, [removed]ABA Document 4.3, "Key Management Standard," American

Add to Reading List

Source URL: www.ssl.stu.neva.ru

Language: English - Date: 2001-07-17 16:00:00
UPDATE