<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Public-key cryptography / Supersingular isogeny key exchange / Sidh / Elliptic curve cryptography / DiffieHellman key exchange / Isogeny / Elliptic curve / Supersingular variety / Whitfield Diffie / Isogenous
Date: 2018-01-13 06:28:10
Cryptography
Post-quantum cryptography
Public-key cryptography
Supersingular isogeny key exchange
Sidh
Elliptic curve cryptography
DiffieHellman key exchange
Isogeny
Elliptic curve
Supersingular variety
Whitfield Diffie
Isogenous

Practical post-quantum key exchange from the Learning with Errors Problem

Add to Reading List

Source URL: rwc.iacr.org

Download Document from Source Website

File Size: 1,84 MB

Share Document on Facebook

Similar Documents

Cryptography / Cyberwarfare / Computer security / Clipper chip / Key escrow / Crypto Wars / Strong cryptography / National Security Agency / Escrow / Computer network / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

DocID: 1xTTs - View Document

Cryptography / Turing Award laureates / Whitfield Diffie / Phillip Rogaway / Martin Hellman / Joseph Rotblat / National Institute of Standards and Technology / David Chaum / Cypherpunk

The Moral Character of Cryptographic Work? Phillip Rogaway Department of Computer Science University of California, Davis, USA December 2015

DocID: 1rqKX - View Document

Susan Landau / Whitfield Diffie / Privacy / Steven M. Bellovin / Association for Computing Machinery / National Cyber Security Hall of Fame / National Security Agency / Lance Hoffman / Annie Antn

Susan Landau Department of Social Science and Policy Studies Salisbury Laboratories 100 Institute Road Worcester, MA

DocID: 1p8K4 - View Document

Cryptography / Security / Cyberwarfare / Clipper chip / Key escrow / Crypto Wars / Computer security / Strong cryptography / National Security Agency / Escrow / Encryption / Secure communication

Keys Under Doormats: mandating insecurity by requiring government access to all data and communications Harold Abelson, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew

DocID: 1mndH - View Document

Turing Award laureates / Public-key cryptography / Cryptography / Applied mathematics / Whitfield Diffie / Ralph Merkle / Martin Hellman / DiffieHellman key exchange / Turing Award / Cryptographic protocol / Ron Rivest / Key management

Contact: Jim OrmondCRYPTOGRAPHY PIONEERS RECEIVE ACM A.M. TURING AWARD

DocID: 1miTr - View Document