Quantum cryptography

Results: 548



#Item
181Hash function / Cyberwarfare / Quantum superposition / Security / Applied mathematics / Cryptography / Commitment scheme / Cryptographic hash function

Computationally binding quantum commitments Dominique Unruh University of Tartu April 21, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 10:58:50
182Cryptography / Quantum complexity theory / PP / Secure multi-party computation / Secure two-party computation / Verifiable secret sharing / Function / Transmission Control Protocol / Cryptographic protocols / Mathematics / Applied mathematics

Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-07-05 10:54:06
183Physics / Qubit / Quantum computer / Quantum cryptography / Quantum decoherence / Quantum entanglement / Quantum teleportation / Quantum error correction / Quantum information science / Theoretical computer science / Quantum mechanics

COMPUTERS AND SCIENCE VIEWPOINT A Quantum Conversation Neil Gershenfeld [ring, ring]

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:01
184XTR / Function / Cryptographic protocols / Mathematics / Elliptic curve Diffie–Hellman / Public-key cryptography

A quantum-safe circuit-extension handshake for Tor

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:35:22
185QUAD / Mathematical sciences / Statistics / Cyberwarfare / Finite fields / Post-quantum cryptography / Cryptography / Multivariate cryptography

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 10:55:50
186Post-quantum cryptography / Finite fields / Cryptography / Multivariate cryptography / Hidden Field Equations / Polynomial / QUAD / Vector space / Unbalanced Oil and Vinegar / Algebra / Abstract algebra / Mathematics

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 09:56:04
187Mathematics / Formal sciences / Quantum information science / Models of computation / Quantum computer / Algorithm / Cryptography / Computer science / Distributed computing / Theoretical computer science / Applied mathematics / Quantum cryptography

PDF Document

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2015-03-19 16:08:36
188Key management / Post-quantum cryptography / Key size / NTRU / Elliptic curve cryptography / Homomorphic encryption / RSA / McEliece cryptosystem / Key / Cryptography / Public-key cryptography / Electronic commerce

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 12:49:59
189Civil law / Digital signature / Key management / Post-quantum cryptography / Hash function / Stateless / Cyberwarfare / Applied mathematics / Cryptography / Public-key cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:46:07
190Religious philosophy / Electronic commerce / McEliece cryptosystem / Post-quantum cryptography / Mathematics / Philosophy / Forward error correction / Paul Tillich / Low-density parity-check code / Coding theory / Error detection and correction / Public-key cryptography

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 11:02:34
UPDATE