<--- Back to Details
First PageDocument Content
Quantum information science / Cryptographic hash functions / Post-quantum cryptography / McEliece cryptosystem / Quantum key distribution / NIST hash function competition / Quantum computer / Advanced Encryption Standard / Symmetric-key algorithm / Cryptography / Quantum cryptography / Public-key cryptography
Date: 2015-04-02 14:17:26
Quantum information science
Cryptographic hash functions
Post-quantum cryptography
McEliece cryptosystem
Quantum key distribution
NIST hash function competition
Quantum computer
Advanced Encryption Standard
Symmetric-key algorithm
Cryptography
Quantum cryptography
Public-key cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 501,49 KB

Share Document on Facebook

Similar Documents

Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics Jun Hasegawa ERATO-SORST, JST

DocID: 1u5WD - View Document

Institutionen för systemteknik Department of Electrical Engineering Examensarbete Quantum Key Distribution - current state of the technology and prospects in the near future.

DocID: 1tp0D - View Document

Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions

DocID: 1tgQg - View Document

Summary of the Theory Component of Quantum Key Distribution and Quantum Cryptography

DocID: 1sHBk - View Document

Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography

DocID: 1rArg - View Document