Post-quantum cryptography

Results: 155



#Item
21Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven  17 September 2017

Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven 17 September 2017

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2017-10-22 12:24:16
    22PQCRYPTO – Post-Quantum Cryptography for Long-term Security Tanja Lange 01 May 2015 Intel Workshop: International View of the

    PQCRYPTO – Post-Quantum Cryptography for Long-term Security Tanja Lange 01 May 2015 Intel Workshop: International View of the

    Add to Reading List

    Source URL: pqcrypto.eu.org

    Language: English - Date: 2016-03-13 11:15:02
      23Post-quantum key exchange for the TLS protocol from R-LWE Craig Costello MSR-T Security and Cryptography Group joint work with Joppe Bos (NXP), Michael Naehrig (MSR), Douglas Stebila (QUT)

      Post-quantum key exchange for the TLS protocol from R-LWE Craig Costello MSR-T Security and Cryptography Group joint work with Joppe Bos (NXP), Michael Naehrig (MSR), Douglas Stebila (QUT)

      Add to Reading List

      Source URL: www.craigcostello.com.au

      Language: English - Date: 2014-10-29 23:31:25
        24Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

        Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards

        Add to Reading List

        Source URL: www.cryptoexperts.com

        - Date: 2016-05-30 09:49:30
          25Microsoft PowerPoint - AWACS-PQC

          Microsoft PowerPoint - AWACS-PQC

          Add to Reading List

          Source URL: www.cryptoexperts.com

          Language: English - Date: 2016-05-30 09:49:30
          26Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

          Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1

          Add to Reading List

          Source URL: thmatters.files.wordpress.com

          Language: English - Date: 2015-09-29 10:45:40
          27Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

          Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics

          Add to Reading List

          Source URL: www.cits.rub.de

          Language: English - Date: 2016-06-24 05:04:33
          28Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ?  1

          Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1

          Add to Reading List

          Source URL: cryptojedi.org

          Language: English - Date: 2015-12-08 11:13:38
          29Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

          Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2016-02-22 01:46:08
          30ProvSec2015@Kanazawa  Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders Katsuyuki Takashima

          ProvSec2015@Kanazawa Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders Katsuyuki Takashima

          Add to Reading List

          Source URL: security-lab.jaist.ac.jp

          Language: English - Date: 2015-11-23 21:58:36