Quantum cryptography

Results: 548



#Item
541Hashing / Models of computation / Cryptography / Cryptographic hash functions / Quantum computer / Quantum algorithm / Quantum circuit / Collision / Post-quantum cryptography / Theoretical computer science / Applied mathematics / Quantum information science

PDF Document

Add to Reading List

Source URL: cr.yp.to

Language: English - Date: 2009-08-23 03:23:14
542Post-quantum cryptography / Cryptographic hash functions / MMH-Badger MAC / Cryptography / One-time pad / Message authentication codes

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 1997-12-09 04:34:39
543Mathematics / Hidden Field Equations / Polynomial / Error detection and correction / Cryptography / Multivariate cryptography / Factorization of polynomials over a finite field and irreducibility tests / Finite fields / Post-quantum cryptography / Coding theory

PDF Document

Add to Reading List

Source URL: www.cryptosystem.net

Language: English - Date: 2007-10-22 04:50:53
544Stream ciphers / Block ciphers / Post-quantum cryptography / Serpent / Q / Hidden Field Equations / Key schedule / Camellia / Differential equation / Cryptography / XSL attack / Advanced Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-11-09 16:02:41
545NTRUSign / NTRUEncrypt / Algebra / Lattice / NTRU / Ideal lattice cryptography / Euclidean algorithm / Post-quantum cryptography / Abstract algebra / Mathematics

PDF Document

Add to Reading List

Source URL: grouper.ieee.org

Language: English - Date: 2008-04-27 09:54:16
546Quantum cryptography / Theoretical computer science / Cryptography / Quantum key distribution / Photon / BB84 / Quantum teleportation / Physics / Quantum information science / Quantum mechanics

PDF Document

Add to Reading List

Source URL: sites.google.com

Language: English
547Encryption / Quantum key distribution / Data security / Network Security & Cryptography / Secure communication / Cryptography / Security / Espionage

PDF Document

Add to Reading List

Source URL: ee.tamu.edu

Language: English - Date: 2005-03-21 15:42:09
548SHA-1 / XTR / One-way function / Key size / Post-quantum cryptography / Cryptography / Cryptographic hash functions / Finite fields

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-01-10 12:30:33
UPDATE