Quantum cryptography

Results: 548



#Item
171Key management / Elliptic curve Diffie–Hellman / Elliptic curve cryptography / NTRU / Kirkwood / Key / Cipher / Cryptography / Post-quantum cryptography / Public-key cryptography

Failure is not an Option: Standardization Issues for Post-Quantum Key Agreement

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:38:35
172Computer science / Quantum information science / Information theory / Quantum computer / Quantum cryptography / Computation / Reversible computing / Cellular automaton / Actor model / Theoretical computer science / Applied mathematics / Models of computation

Parallel Quantum Computation∗ Norman Margolus MIT Laboratory For Computer Science Cambridge MassachusettsJune 1989

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2005-01-16 13:05:59
173Quantum information science / Quantum cryptography / Models of computation / Ciphertext indistinguishability / Semantic security / Quantum circuit / Quantum key distribution / Quantum computer / Quantum channel / Cryptography / Theoretical computer science / Applied mathematics

Semantic Security and Indistinguishability in the Quantum World April 20, 2015 Tommaso Gagliardoni1 , Andreas H¨ ulsing2 , and Christian Schaffner3,4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 15:29:56
174Mathematics / Computer algebra / Finite fields / Algebraic geometry / Hidden Field Equations / Commutative algebra / QUAD / Polynomial / Unbalanced Oil and Vinegar / Abstract algebra / Algebra / Post-quantum cryptography

MQ Challenge: Hardness Evaluation of Solving MQ problems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:40:15
175Quantum information science / Cryptographic hash functions / Post-quantum cryptography / McEliece cryptosystem / Quantum key distribution / NIST hash function competition / Quantum computer / Advanced Encryption Standard / Symmetric-key algorithm / Cryptography / Quantum cryptography / Public-key cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
176Theoretical computer science / Information theory / Computational complexity theory / Randomness extractor / Random number generation / Entropy / Pseudorandomness / Algorithmically random sequence / Min-entropy / Randomness / Cryptography / Applied mathematics

Downloaded from http://rsta.royalsocietypublishing.org/ on May 24, 2015 Phil. Trans. R. Soc. A, 3432–3448 doi:rstaCertifiable quantum dice

Add to Reading List

Source URL: rsta.royalsocietypublishing.org

Language: English
177Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols

Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:27:47
178Quantum cryptography / Theoretical computer science / Key management / Quantum computer / Key size / Quantum algorithm / NTRU / Public-key cryptography / Cryptanalysis / Cryptography / Applied mathematics / Quantum information science

Quantum Computing and Cryptography

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:46:34
179Homomorphic encryption / Post-quantum cryptography / Learning with errors / Quantum computer / Zero-knowledge proof / Public-key cryptography / RSA / Random self-reducibility / Oblivious transfer / Cryptography / Lattice-based cryptography / Lattice problem

Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 18:23:29
180McEliece cryptosystem / Post-quantum cryptography / Quantum computer / Adaptive chosen-ciphertext attack / Authenticated encryption / RSA / Ciphertext / Chosen-ciphertext attack / Cipher / Cryptography / Public-key cryptography / Electronic commerce

Botan’s Implementation of the McEliece PKC Falko Strenzke cryptosource GmbH December 30, 2014

Add to Reading List

Source URL: www.cryptosource.de

Language: English - Date: 2015-03-02 11:16:55
UPDATE