Post-quantum cryptography

Results: 155



#Item
61Mathematics / Computer algebra / Finite fields / Algebraic geometry / Hidden Field Equations / Commutative algebra / QUAD / Polynomial / Unbalanced Oil and Vinegar / Abstract algebra / Algebra / Post-quantum cryptography

MQ Challenge: Hardness Evaluation of Solving MQ problems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:40:15
62Quantum information science / Cryptographic hash functions / Post-quantum cryptography / McEliece cryptosystem / Quantum key distribution / NIST hash function competition / Quantum computer / Advanced Encryption Standard / Symmetric-key algorithm / Cryptography / Quantum cryptography / Public-key cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
63Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:27:47
64Homomorphic encryption / Post-quantum cryptography / Learning with errors / Quantum computer / Zero-knowledge proof / Public-key cryptography / RSA / Random self-reducibility / Oblivious transfer / Cryptography / Lattice-based cryptography / Lattice problem

Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 18:23:29
65McEliece cryptosystem / Post-quantum cryptography / Quantum computer / Adaptive chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext / Chosen-ciphertext attack / Cipher / Cryptography / Public-key cryptography / Electronic commerce

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: www.cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
66QUAD / Mathematical sciences / Statistics / Cyberwarfare / Finite fields / Post-quantum cryptography / Cryptography / Multivariate cryptography

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 10:55:50
67Post-quantum cryptography / Finite fields / Cryptography / Multivariate cryptography / Hidden Field Equations / Polynomial / QUAD / Vector space / Unbalanced Oil and Vinegar / Algebra / Abstract algebra / Mathematics

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 09:56:04
68Key management / Post-quantum cryptography / Key size / NTRU / Elliptic curve cryptography / Homomorphic encryption / RSA / McEliece cryptosystem / Key / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 12:49:59
69Civil law / Digital signature / Key management / Post-quantum cryptography / Hash function / Stateless / Cyberwarfare / Applied mathematics / Cryptography / Public-key cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:46:07
70Religious philosophy / Electronic commerce / McEliece cryptosystem / Post-quantum cryptography / Mathematics / Philosophy / Forward error correction / Paul Tillich / Low-density parity-check code / Coding theory / Error detection and correction / Public-key cryptography

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 11:02:34
UPDATE