The following pages link to Post-Quantum Cryptography (Q3532979):
Displaying 40 items.
- On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields (Q268465) (← links)
- Controlled quantum secure direct communication by entanglement distillation or generalized measurement (Q296146) (← links)
- A multivariate based threshold ring signature scheme (Q371251) (← links)
- On the geometry of cyclic lattices (Q464733) (← links)
- An experimental comparison of some LLL-type lattice basis reduction algorithms (Q722627) (← links)
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- A security analysis of uniformly-layered Rainbow defined over non-commutative rings (Q890605) (← links)
- Quantum cryptography beyond quantum key distribution (Q908054) (← links)
- Authenticated communication from quantum readout of pufs (Q1700008) (← links)
- Cryptanalysis of Riccati equation encryption schemes TP-I and TP-II (Q1800692) (← links)
- Lattices from abelian extensions and error-correcting codes (Q1983219) (← links)
- Computational problems in supersingular elliptic curve isogenies (Q1994699) (← links)
- A study on randomness used in signature generation of UOV (Q2079890) (← links)
- An improved quantum algorithm for the quantum learning with errors problem (Q2107929) (← links)
- Efficient key recovery for all HFE signature variants (Q2120067) (← links)
- General linear group action on tensors: a candidate for post-quantum cryptography (Q2175914) (← links)
- Secure two-party computation in a quantum world (Q2229292) (← links)
- Optimum commutative group codes (Q2256103) (← links)
- Cryptanalysis of the CLR-cryptosystem (Q2414934) (← links)
- Efficient public-key operation in multivariate schemes (Q2415397) (← links)
- A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack (Q2415416) (← links)
- On the equivalence of two post-quantum cryptographic families (Q2687966) (← links)
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece'' hardware reference implementation (Q2692373) (← links)
- A Multivariate Encryption Scheme with Rainbow (Q2801772) (← links)
- Reducing the Key Size of Rainbow Using Non-commutative Rings (Q2889995) (← links)
- Faster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive Hashing (Q2946443) (← links)
- A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors (Q2958147) (← links)
- On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack (Q3102784) (← links)
- Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes (Q3294870) (← links)
- An LWE-based verifiable threshold secret sharing scheme (Q3383067) (← links)
- Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing (Q3457102) (← links)
- On the Berger - Loidreau Cryptosystem on the Tensor Product of Codes (Q4972204) (← links)
- Efficient Key Generation for Rainbow (Q5041216) (← links)
- Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite (Q5056039) (← links)
- (Q5152110) (← links)
- (Q5204073) (← links)
- A multivariate quadratic challenge toward post-quantum generation cryptography (Q5270181) (← links)
- Revisiting the Efficient Key Generation of ZHFE (Q5739034) (← links)
- A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials (Q5742929) (← links)
- Survey of Lattice-Based Group Signature (Q5855889) (← links)