Post-quantum cryptography

Results: 155



#Item
131Elliptic curves / Public-key cryptography / Elliptic curve cryptography / NTRU / Elliptic Curve DSA / Lattice problem / Counting points on elliptic curves / Hyperelliptic curve cryptography / Elliptic curve / Cryptography / Post-quantum cryptography / Finite fields

References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:42:48
132Cryptographic protocols / Post-quantum cryptography / Elliptic curve cryptography / NTRU / Outline of cryptography / Cryptanalysis / Lattice-based cryptography / Alice and Bob / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Finite fields

Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:45:18
133Post-quantum cryptography / Quantum cryptography / Key size / Quantum computer / NTRU / Digital signature / Elliptic Curve DSA / Cipher / XTR / Cryptography / Public-key cryptography / Key management

Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed] 17 December 2008

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2009-01-22 19:45:07
134Post-quantum cryptography / McEliece cryptosystem / RSA / Quantum computer / Forward error correction / Cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

SCIENCE NEWS PRIME[removed]JULIE REHMEYER ∫ MATH TREK

Add to Reading List

Source URL: tuvalu.santafe.edu

Language: English - Date: 2011-08-30 17:13:56
135Post-quantum cryptography / Algebraic geometry / Cryptography / Multivariate cryptography / Finite fields / Polynomials / QUAD / Monomial / XTR / Algebra / Abstract algebra / Mathematics

Efficient Implementations of Multivariate Quadratic Systems

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
136Post-quantum cryptography / Ø / Acute accent / Goppa code / Mathematics / Applied mathematics / Notation / ISO/IEC / C1 Controls and Latin-1 Supplement / Public-key cryptography / Electronic commerce / McEliece cryptosystem

Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:07:38
137Post-quantum cryptography / Merkle signature scheme / Hashing / Digital signature / Cryptographic hash function / Digital Signature Algorithm / Elliptic Curve DSA / RSA / Hash function / Cryptography / Public-key cryptography / Key management

CMSS – An Improved Merkle Signature Scheme Johannes Buchmann1 , Luis Carlos Coronado Garc´ıa2 , Erik Dahmen1 , Martin D¨

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2006-10-23 05:39:57
138Algebra / Polynomials / Hidden Field Equations / Cryptography / Coding theory / Multivariate cryptography / Factorization of polynomials over a finite field and irreducibility tests / Abstract algebra / Post-quantum cryptography / Mathematics

12 Hidden Field Equations

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2004-10-11 07:37:09
139Post-quantum cryptography / Lie groups / Number theory / NTRUEncrypt / Lattice / Learning with errors / Valuation / Normal distribution / Ideal lattice cryptography / Cryptography / Abstract algebra / Mathematics

Making NTRU as Secure as Worst-Case Problems over Ideal Lattices Damien Stehlé1 and Ron Steinfeld2

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2011-02-24 04:40:45
140Public-key cryptography / Hidden Field Equations / Multivariate cryptography / QUAD / XTR / Trapdoor function / RSA / Index of cryptography articles / Benaloh cryptosystem / Cryptography / Post-quantum cryptography / Finite fields

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-04-04 07:06:39
UPDATE