Post-quantum cryptography

Results: 155



#Item
51Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2014-10-04 10:08:48
52Post-quantum cryptography / Error detection and correction / Cryptographic hash function / Merkle signature scheme / Digital signature / Hash function / Cryptography / Public-key cryptography / Hashing

draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2015-04-08 10:22:54
53Automorphic forms / Post-quantum cryptography / Analytic number theory / Modular forms / Number theorists / NTRUEncrypt / Joseph H. Silverman / NTRU / Jill Pipher / Mathematical analysis / Mathematics / Abstract algebra

1. J. Hoffstein, A. Kontorovich, The first non-vanishing quadratic twist of an automorphic L-series, preprint 2. S. Ganguly, J. Hoffstein, J. Sengupta, Determining modular forms on SL(2, Z) by central values of convoluti

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2009-09-09 20:10:33
54Partial differential equations / Post-quantum cryptography / Number theorists / Jill Pipher / Fourier analysis / Differential operators / NTRUEncrypt / NTRU / Dirichlet problem / Mathematical analysis / Mathematics / Calculus

Curriculum Vitae: Jill C. Pipher ACADEMIC DEGREES B.A. in Mathematics, UCLA, 1979 PhD. in Mathematics, UCLA, 1985, Harmonic Analysis

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2015-01-15 13:34:56
55Security / Paillier cryptosystem / Merkle–Hellman knapsack cryptosystem / Niederreiter cryptosystem / Cryptography / Post-quantum cryptography / Cryptosystem / RSA / Semantic security / Public-key cryptography / Cyberwarfare / Applied mathematics

Noname manuscript No. (will be inserted by the editor) Generalizing Cryptosystems Based on the Subset Sum Problem Aniket Kate · Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-05-05 15:39:42
56Machine learning / AKA / Secure Shell / Perfect forward secrecy / Data / Information / Computing / Cryptography / Cryptographic protocols / Learning with errors

Post-quantum Authenticated Key Exchange from Ideal Lattices ¨ u¨ r Dagdelen3 Jiang Zhang1 , Zhenfeng Zhang1,∗ , Jintai Ding2,∗ , Michael Snook2 , and Ozg 1 Institute of Software, Chinese Academy of Sciences, China

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:41:32
57Theoretical computer science / Quantum cryptography / Quantum computer / Post-quantum cryptography / Digital signature / Quantum algorithm / Key size / Cryptographic primitive / Elliptic curve cryptography / Cryptography / Public-key cryptography / Key management

Evaluating Post-Quantum Asymmetric Cryptographic Algorithm Candidates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:28:55
58Post-quantum cryptography / Key size / Cloud computing / Alice and Bob / Cryptography / Quantum cryptography / Quantum information science

PQCRYPTO project in the EU Tanja Lange 3 April 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:35:45
59NTRUSign / Lattice-based cryptography / NTRU / Homomorphic encryption / Digital signature / Lattice problem / RSA / Elliptic curve cryptography / Lattice / Cryptography / Post-quantum cryptography / Public-key cryptography

Practical Lattice-based Digital Signature Schemes

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:42:22
60Key management / Elliptic curve Diffie–Hellman / Elliptic curve cryptography / NTRU / Kirkwood / Key / Cipher / Cryptography / Post-quantum cryptography / Public-key cryptography

Failure is not an Option: Standardization Issues for Post-Quantum Key Agreement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:38:35
UPDATE