Quantum cryptography

Results: 548



#Item
21Post-quantum cryptography Tanja Lange 02 October 2015 Academy Contact Forum “Coding Theory and Cryptography VI”

Post-quantum cryptography Tanja Lange 02 October 2015 Academy Contact Forum “Coding Theory and Cryptography VI”

Add to Reading List

Source URL: pqcrypto.eu.org

Language: English - Date: 2016-03-13 11:43:49
    22The H2020 PQCRYPTO project Andreas H¨ ulsing 05 October 2015 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography

    The H2020 PQCRYPTO project Andreas H¨ ulsing 05 October 2015 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography

    Add to Reading List

    Source URL: pqcrypto.eu.org

    Language: English - Date: 2016-03-13 11:27:22
      23Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven  17 September 2017

      Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven 17 September 2017

      Add to Reading List

      Source URL: hyperelliptic.org

      Language: English - Date: 2017-10-22 12:24:16
        24PQCRYPTO – Post-Quantum Cryptography for Long-term Security Tanja Lange 01 May 2015 Intel Workshop: International View of the

        PQCRYPTO – Post-Quantum Cryptography for Long-term Security Tanja Lange 01 May 2015 Intel Workshop: International View of the

        Add to Reading List

        Source URL: pqcrypto.eu.org

        Language: English - Date: 2016-03-13 11:15:02
          25Current Quantum Cryptography Algorithm Is Optimal: A Proof 1st Oscar Galindo 2 Vladik Kreinovich nd

          Current Quantum Cryptography Algorithm Is Optimal: A Proof 1st Oscar Galindo 2 Vladik Kreinovich nd

          Add to Reading List

          Source URL: www.cs.utep.edu

          Language: English - Date: 2018-05-26 11:55:30
            26Post-quantum key exchange for the TLS protocol from R-LWE Craig Costello MSR-T Security and Cryptography Group joint work with Joppe Bos (NXP), Michael Naehrig (MSR), Douglas Stebila (QUT)

            Post-quantum key exchange for the TLS protocol from R-LWE Craig Costello MSR-T Security and Cryptography Group joint work with Joppe Bos (NXP), Michael Naehrig (MSR), Douglas Stebila (QUT)

            Add to Reading List

            Source URL: www.craigcostello.com.au

            Language: English - Date: 2014-10-29 23:31:25
              27Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS  October, 3rd, 2016

              Some Recent Uses of Stern-like Protocols in Lattice-Based Cryptography Khoa Nguyen, Nanyang Technological University Quantum-Safe Crypto Workshop, CQT, NUS October, 3rd, 2016

              Add to Reading List

              Source URL: quantum-safe-crypto.quantumlah.org

              - Date: 2016-10-04 03:16:29
                28Business Meeting 7th International Conference on Quantum Cryptography QCrypt 2017 Sept 18-22, 2017 Cambridge, UK

                Business Meeting 7th International Conference on Quantum Cryptography QCrypt 2017 Sept 18-22, 2017 Cambridge, UK

                Add to Reading List

                Source URL: 2017.qcrypt.net

                - Date: 2017-09-27 01:52:53
                  29Bachelor Thesis  Quantum Cryptography Petra Pajic

                  Bachelor Thesis Quantum Cryptography Petra Pajic

                  Add to Reading List

                  Source URL: homepage.univie.ac.at

                  - Date: 2013-11-19 16:38:01
                    30Quantum Cryptography J. Aditya, P. Shankar Rao {Dept of CSE, Andhra University} Email: {adityajami,techmaster4u}@gmail.com ABSTRACT Modern cryptography algorithms are based over the fundamental process of factoring large

                    Quantum Cryptography J. Aditya, P. Shankar Rao {Dept of CSE, Andhra University} Email: {adityajami,techmaster4u}@gmail.com ABSTRACT Modern cryptography algorithms are based over the fundamental process of factoring large

                    Add to Reading List

                    Source URL: cs.stanford.edu

                    - Date: 2014-12-07 23:53:04