Quantum cryptography

Results: 548



#Item
241Hardware random number generator / Random number generation / Id Quantique / Pseudorandom number generator / Pseudorandomness / Randomness / Cryptography / Computer peripherals

USER CASE REDEFINING RANDOMNESS Loterie Romande Quantum Draws for Lottery Games in Switzerland Quantis True Random Number Generator in Lottery Application

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:13
242Mathematics / Quantum complexity theory / Accumulator / Central processing unit / Zero-knowledge proof / Proof of knowledge / Polynomial / Function / NP / Cryptography / Cryptographic protocols / Applied mathematics

Zero-Knowledge Accumulators and Set Operations Esha Ghosh1 , Olga Ohrimenko2 , Dimitrios Papadopoulos3 , Roberto Tamassia1 and Nikos Triandopoulos4,3 1 Dept. of Computer Science, Brown University, Providence RI, USA esha

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 18:00:30
243Post-quantum cryptography / Digital signature / Group signature / Ring signature / RSA / Digital Signature Algorithm / Key / Random oracle / ID-based encryption / Cryptography / Public-key cryptography / Key management

Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-23 05:46:43
244Hidden Field Equations / Cryptography / Post-quantum cryptography / Public-key cryptography

A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation Masao KASAHARA Faculty of Informatics, Osaka Gakuin University, Suita-shi, Japan. .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-20 02:54:57
245Euclidean algorithm / McEliece cryptosystem / Differential equation / Equation solving / Vector space / Degree of a continuous mapping / Algebra / Mathematics / Post-quantum cryptography

Timing Attacks against the Syndrome Inversion in Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 10:49:20
246Cryptography / Data / Computing / Internet standards / Cipher suite / Transport Layer Security / TLS-PSK / Public-key cryptography / HTTP Secure / Cryptographic protocols / Internet protocols / Secure communication

1 DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS Oscar Garcia-Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen and Jose Luis

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:49:31
247Coding theory / Error detection and correction / Theoretical computer science / Numerical analysis / McEliece cryptosystem / Post-quantum cryptography / Niederreiter cryptosystem / List decoding / Horner scheme / Mathematics / Public-key cryptography / Applied mathematics

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
248Applied mathematics / Quantum cryptography / Emerging technologies / Quantum key distribution / Quantum digital signature / BB84 / Quantum computer / Quantum error correction / Qubit / Cryptography / Quantum information science / Theoretical computer science

QUANTUM DIGITAL SIGNATURE BASED ON QUANTUM ONE-WAY FUNCTIONS Xin L¨u State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing, 100039,China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-27 20:46:34
249Polynomials / Post-quantum cryptography / Computer algebra / Finite fields / Algebraic geometry / Hidden Field Equations / Multivariate cryptography / Gröbner basis / Field extension / Abstract algebra / Algebra / Mathematics

A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery) Charles Bouillaguet1 , Pierre-Alain Fouque1 , Antoine Joux2,3 , and Joana Treger2 1 Ecole Normale Supérieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-15 10:42:41
250Hidden Field Equations / Unbalanced Oil and Vinegar / Full Domain Hash / RSA / Digital signature / One-way function / Cryptography / Public-key cryptography / Post-quantum cryptography

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature Shaohua Tang1,? , Jiahui Chen2 , Lingling Xu3 , Xiaoyu Li4 School of Computer Science & Engineering, South China University of Technolog

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-30 04:23:42
UPDATE