Back to Results
First PageMeta Content
Secure communication / Electronic commerce / Learning with errors / NTRU / Transport Layer Security / Cipher suite / Elliptic curve cryptography / Quantum computer / RSA / Cryptography / Cryptographic protocols / Internet protocols


Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Joppe W. Bos1 , Craig Costello2 , Michael Naehrig2 , and Douglas Stebila3,∗ 1 2 3
Add to Reading List

Document Date: 2015-04-09 11:27:47


Open Document

File Size: 1,37 MB

Share Result on Facebook

City

Abstract Lattice / Leuven / /

Company

NXP Semiconductors / Microsoft / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

USA Queensland University of Technology / CyaSSL library / OpenSSL library / /

IndustryTerm

Internet-Draft / classical algorithm / probabilistic algorithm / password-authenticated key exchange protocol / quantum algorithm / present key exchange protocols / lattice-basis reduction algorithms / search problem / secure key agreement protocol / unauthenticated key exchange protocol / different algorithms / post-quantum authenticated key exchange protocol / search algorithm / agreement protocol / web servers / recent lattice-based key agreement protocol / into existing network / basic key exchange protocol / simulation algorithm / software implementation / reduction algorithms / web server / efficient algorithms / Apache web server / /

NaturalFeature

confidential channel / /

Organization

Queensland University of Technology / Brisbane / Australian Research Council / African Union / /

Person

Alice Bob / /

Position

SVP / IND-CPA / standard security model for TLS / /

Product

KV09 / DR08 / DXL12 / Pei14 / Section / DH76 / /

Technology

reduction algorithms / unauthenticated key exchange protocol / R-LWE algorithms / provably secure key agreement protocol / similar DH-like protocol / Hellman-like protocol / quantum algorithm / R-LWE protocol / HMQV-like key exchange protocol / search algorithm / efficient algorithms / key exchange protocol / password-authenticated key exchange protocol / R-LWE key exchange protocol / key exchange protocols / key agreement protocol / DH-like protocol / recent lattice-based key agreement protocol / private key / secret key / R-LWE algorithm / lattice-basis reduction algorithms / existing network protocols / basic key exchange protocol / Hellman-like key exchange protocol / probabilistic algorithm / public key encryption / encryption / BKZ-2.0 simulation algorithm / post-quantum authenticated key exchange protocol / cryptography / TLS protocol / public key / Hellman protocol / HTTP / present key exchange protocols / simulation / logarithm-based DH protocol / different algorithms / web server / /

SocialTag