Post-quantum cryptography

Results: 155



#Item
151Post-quantum cryptography / Cryptographic hash functions / MMH-Badger MAC / Cryptography / One-time pad / Message authentication codes

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 1997-12-09 04:34:39
152Mathematics / Hidden Field Equations / Polynomial / Error detection and correction / Cryptography / Multivariate cryptography / Factorization of polynomials over a finite field and irreducibility tests / Finite fields / Post-quantum cryptography / Coding theory

PDF Document

Add to Reading List

Source URL: www.cryptosystem.net

Language: English - Date: 2007-10-22 04:50:53
153Stream ciphers / Block ciphers / Post-quantum cryptography / Serpent / Q / Hidden Field Equations / Key schedule / Camellia / Differential equation / Cryptography / XSL attack / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-09 16:02:41
154NTRUSign / NTRUEncrypt / Algebra / Lattice / NTRU / Ideal lattice cryptography / Euclidean algorithm / Post-quantum cryptography / Abstract algebra / Mathematics

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:54:16
155SHA-1 / XTR / One-way function / Key size / Post-quantum cryptography / Cryptography / Cryptographic hash functions / Finite fields

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-10 12:30:33
UPDATE