Post-quantum cryptography

Results: 155



#Item
31Post-processing procedure for industrial quantum key distribution systems arXiv:E.O. Kiktenko1,2 , A.S. Trushechkin2,3 , R.U. Valiev1,4 , Y.V. Kurochkin1 , and A.K. Fedorov1,2 1 Russian

Post-processing procedure for industrial quantum key distribution systems arXiv:E.O. Kiktenko1,2 , A.S. Trushechkin2,3 , R.U. Valiev1,4 , Y.V. Kurochkin1 , and A.K. Fedorov1,2 1 Russian

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:46
32State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1  Cisco Systems, USA

State Management for Hash Based Signatures David McGrew1 , Panos Kampanakis1 , Scott Fluhrer1 , Stefan-Lukas Gazdag2 , Denis Butin3 , and Johannes Buchmann3 1 Cisco Systems, USA

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-04-06 13:04:46
33Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Semantic Security and Indistinguishability in the Quantum World June 1, 2016? Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4,5

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-06-01 09:51:10
34Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast

Towards Quantum Resistant Cryptography Standards Dr. Markku-Juhani O. Saarinen Research Fellow, Queen’s University Belfast

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:53
35Post-Quantum Cryptography

Post-Quantum Cryptography

Add to Reading List

Source URL: web.archive.org

Language: English
    36International View of the State-of-theArt of Cryptography and Security and its Use in Practice (VII) MayVenue: Sofia Hotel Balkan, Royal II Participation: Please contact Claire Vishik () if

    International View of the State-of-theArt of Cryptography and Security and its Use in Practice (VII) MayVenue: Sofia Hotel Balkan, Royal II Participation: Please contact Claire Vishik () if

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2015-04-30 04:18:18
    37For Office use only Date: ___/___/___ PQC 2010 REGISTRATION FORM The Third International Workshop on Post-Quantum Cryptography

    For Office use only Date: ___/___/___ PQC 2010 REGISTRATION FORM The Third International Workshop on Post-Quantum Cryptography

    Add to Reading List

    Source URL: pqc2010.cased.de

    Language: English - Date: 2010-02-17 02:00:22
      38Topics in Post-Quantum Cryptography Lattice-Based Methods Jesko H¨ uttenhain

      Topics in Post-Quantum Cryptography Lattice-Based Methods Jesko H¨ uttenhain

      Add to Reading List

      Source URL: www.huettenhain.net

      Language: English
        39An introduction to post-quantum cryptography Andrew Savchenko NRNU MEPhI, Moscow, Russia  LVEE Winter 2016

        An introduction to post-quantum cryptography Andrew Savchenko NRNU MEPhI, Moscow, Russia LVEE Winter 2016

        Add to Reading List

        Source URL: lvee.org

        Language: English - Date: 2016-03-16 03:33:59
          40Lattice Signatures and Bimodal Gaussians L´eo Ducas∗ and Alain Durmus∗∗ and Tancr`ede Lepoint† and Vadim Lyubashevsky‡ {Leo.Ducas, Alain.Durmus, Tancrede.Lepoint, Vadim.Lyubashevsky}@ens.fr Abstract. Our main

          Lattice Signatures and Bimodal Gaussians L´eo Ducas∗ and Alain Durmus∗∗ and Tancr`ede Lepoint† and Vadim Lyubashevsky‡ {Leo.Ducas, Alain.Durmus, Tancrede.Lepoint, Vadim.Lyubashevsky}@ens.fr Abstract. Our main

          Add to Reading List

          Source URL: www.di.ens.fr

          Language: English - Date: 2013-09-25 15:09:35