scientific article

From MaRDI portal
Revision as of 23:50, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3522446

zbMath1152.81800arXivquant-ph/0301141MaRDI QIDQ3522446

Christof Zalka, John Proos

Publication date: 3 September 2008

Full work available at URL: https://arxiv.org/abs/quant-ph/0301141

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (25)

Improved Quantum Circuits for Elliptic Curve Discrete LogarithmsGroup ring based public key cryptosystemsThe matrix reloaded: multiplication strategies in FrodoKEMLayering quantum-resistance into classical digital signature algorithmsSimulations of Shor's algorithm using matrix product statesQuantum algorithms for typical hard problems: a perspective of cryptanalysisQuantum algorithm for solving hyperelliptic curve discrete logarithm problemConcrete quantum cryptanalysis of binary elliptic curves via addition chainHigher-order masked SaberQuantum circuits for hyperelliptic curve discrete logarithms over the mersenne prime fieldsThe special case of cyclotomic fields in quantum algorithms for unit groupsNon-associative public-key cryptographySide Channels in the McEliece PKCCommitting to Quantum Resistance, Better: A Speed-and-Risk-Configurable Defence for Bitcoin Against a Fast Quantum Computing AttackQuantum algorithm design: techniques and applicationsSaber on ESP32Bitcoin Crypto–Bounties for Quantum Capable AdversariesFast Reed-Solomon Interactive Oracle Proofs of ProximityHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionQuantum algorithm to find invariant linear structure of \(MD\) hash functionsA key exchange protocol using matrices over group ringTransitive Signatures from Braid GroupsOn the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve CryptographyConjugacy systems based on nonabelian factorization problems and their applications in cryptographyNew approaches to designing public key cryptosystems using one-way functions and trapdoors in finite groups




This page was built for publication: