Quantum cryptography

Results: 548



#Item
121

Fifth International Workshop on Post-Quantum Cryptography PQCrypto 2013 Limoges, France, June 47, 2013 http://pqcrypto2013.xlim.fr/

Add to Reading List

Source URL: pqcrypto2013.xlim.fr

Language: English - Date: 2013-06-24 09:53:47
    122

    Device-independent two-party cryptography Jędrzej Kaniewski,1, 2 Thomas Vidick,3 and Stephanie Wehner1, 2 1 Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, Singapore

    Add to Reading List

    Source URL: 2015.qcrypt.net

    Language: English - Date: 2015-09-22 01:52:58
      123

      Third International Workshop on Post-Quantum Cryptography PQCrypto 2010 Darmstadt, Germany, May 2528, 2010 http://pqc2010.cased.de/

      Add to Reading List

      Source URL: pqc2010.cased.de

      Language: English - Date: 2009-11-05 01:35:29
        124Cryptography / Computing / Security / Engineering / SimOS / Computer science / Software testing / Institute for Applied Information Processing and Communications / International Conference on Availability /  Reliability and Security / Computer security / Post-quantum cryptography

        Scientific Report First name / Family name Dr. Dimitrios Simos

        Add to Reading List

        Source URL: fellowship.ercim.eu

        Language: English - Date: 2015-04-23 10:01:32
        125

        Post Quantum Cryptography: Implementing Alternative Public Key Schemes on Embedded Devices

        Add to Reading List

        Source URL: www.emsec.rub.de

        Language: English - Date: 2014-03-28 10:00:16
          126

          Position-Based Quantum Cryptography: Impossibility and Constructions Harry Buhrman∗ Vipul Goyal§ Nishanth Chandran†

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2010-12-12 14:30:04
            127

            Ruhr-University Bochum Post Quantum Cryptography on Embedded Devices: An Ecient Implementation of the McEliece Public Key Scheme based on

            Add to Reading List

            Source URL: www.emsec.rub.de

            Language: English - Date: 2012-10-11 02:29:54
              128Cryptography / Post-quantum cryptography / Lattice-based cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Key-recovery attack / NTRU / RSA / Ciphertext indistinguishability / Ideal lattice cryptography

              Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

              Add to Reading List

              Source URL: isc2015.item.ntnu.no

              Language: English - Date: 2015-09-20 14:16:36
              129Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

              SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

              Add to Reading List

              Source URL: cryptojedi.org

              Language: English - Date: 2014-10-04 10:08:48
              130

              Quantum Computing and Cryptography Spring Semester 2011 Steve Vickers The University of Birmingham School of Computer Science

              Add to Reading List

              Source URL: www.cs.bham.ac.uk

              Language: English - Date: 2011-03-02 03:13:11
                UPDATE