Post-quantum cryptography

Results: 155



#Item
71Digital signature / Hash function / Post-quantum cryptography / Lamport signature / Cryptography / Cryptographic hash function / Collision resistance

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 15:13:59
72Quantum cryptography / Post-quantum cryptography / Quantum information science / Computational complexity theory / Quantum computer / Lattice-based cryptography / Index of cryptography articles / Cryptography / Theoretical computer science / Applied mathematics

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 10:56:48
73Discrete mathematics / Mathematics / Finite fields / Computer arithmetic / Post-quantum cryptography / Hamming code / McEliece cryptosystem / Cyclic code / Reed–Solomon error correction / Coding theory / Error detection and correction / Information theory

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:13:04
74Post-quantum cryptography / RSA / Index of cryptography articles / Cryptography / Quantum cryptography / Public-key cryptography

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 13:35:20
75Applied mathematics / Quantum information science / Quantum key distribution / Post-quantum cryptography / Quantum computer / Key size / NTRU / Quantum mechanics / Public-key cryptography / Cryptography / Quantum cryptography / Theoretical computer science

IDQ White Paper - IDQ on Quantum Technologies

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
76Cryptography / Lattice points / Post-quantum cryptography / Computational number theory / Linear algebra / Lattice-based cryptography / Lattice problem / Lattice / SWIFFT / Mathematics / Algebra / Abstract algebra

Lattice-based Cryptography Daniele Micciancio∗ Oded Regev† July 22, 2008

Add to Reading List

Source URL: www.cims.nyu.edu

Language: English - Date: 2008-07-22 12:40:02
77Finite groups / Classification of finite simple groups / Feit–Thompson theorem / Simple group / Michael Aschbacher / Group / CA-group / John G. Thompson / Abstract algebra / Algebra / Group theory

POST QUANTUM CRYPTOGRAPHY – WIDENING THE SEARCH Michael Collins University of Oxford

Add to Reading List

Source URL: www.turing-gateway.cam.ac.uk

Language: English - Date: 2014-09-23 05:58:28
78McEliece cryptosystem / Post-quantum cryptography / Quantum computer / Adaptive chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext / Chosen-ciphertext attack / Cipher / Cryptography / Public-key cryptography / Electronic commerce

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
79Post-quantum cryptography / Finite fields / Hidden Field Equations / Affine geometry / Affine transformation / Parity of a permutation / Abstract algebra / Geometry / Mathematics

Equivalent Keys in HFE, C∗ , and variations Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven.ac.be or chris@

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-09 08:01:38
80Hidden Field Equations / Unbalanced Oil and Vinegar / Affine transformation / Quadratic polynomial / Vector space / Polynomial / Multivariate cryptography / Algebraic geometry / Algebra / Mathematics / Post-quantum cryptography

Superfluous Keys in Multivariate Quadratic Asymmetric Systems Christopher Wolf and Bart Preneel K.U.Leuven ESAT-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {Christopher.Wolf,Bart.Preneel}@esat.kuleuven

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-28 03:37:27
UPDATE