Post-quantum cryptography: state of the art
DOI10.1007/978-3-662-49301-4_6zbMATH Open1405.94002OpenAlexW2398921709MaRDI QIDQ2803619FDOQ2803619
Authors: Denis Butin, Florian Göpfert, Albrecht Petzoldt, Johannes Buchmann
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://zenodo.org/record/845312
Recommendations
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60) Quantum computation (81P68) Research exposition (monographs, survey articles) pertaining to quantum theory (81-02) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- BKZ 2.0: Better lattice security estimates
- Title not available (Why is that?)
- Keccak
- On ideal lattices and learning with errors over rings
- Fully homomorphic encryption using ideal lattices
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- A method for obtaining digital signatures and public-key cryptosystems
- Title not available (Why is that?)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Factoring polynomials with rational coefficients
- A new index calculus algorithm with complexity \(L(1/4+o(1))\) in small characteristic
- Information-set decoding for linear codes over \(\mathbb F_q\)
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- New directions in cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Strengths and Weaknesses of Quantum Computing
- Elliptic Curve Cryptosystems
- Simple matrix scheme for encryption
- Better key sizes (and attacks) for LWE-based encryption
- Title not available (Why is that?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- An improved compression technique for signatures based on learning with errors
- Lattice signatures and bimodal Gaussians
- Making NTRU as secure as worst-case problems over ideal lattices
- Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices
- Generalized Compact Knapsacks Are Collision Resistant
- Title not available (Why is that?)
- RIPEMD-160: a strengthened version of RIPEMD
- How to Break MD5 and Other Hash Functions
- Fast Software Encryption
- SSE Implementation of Multivariate PKCs on Modern x86 CPUs
- Unbalanced Oil and Vinegar Signature Schemes
- A multivariate based threshold ring signature scheme
- Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
- A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
- A new identification scheme based on syndrome decoding
- Title not available (Why is that?)
- The hardness of the closest vector problem with preprocessing
- Rainbow, a New Multivariable Polynomial Signature Scheme
- Title not available (Why is that?)
- A Method of Factoring and the Factorization of F 7
- Secure and anonymous hybrid encryption from coding theory
- Design Principles for HFEv- Based Multivariate Signature Schemes
- On the security of the Winternitz one-time signature scheme
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions
- CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key
- McEliece Cryptosystem Implementation: Theory and Practice
- Solving BDD by enumeration: an update
- Lattice decoding attacks on binary LWE
- Linear recurring sequences for the UOV key generation
- Implementing CFS
- Faster 2-regular information-set decoding
- Title not available (Why is that?)
Cited In (12)
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
- New mission and opportunity for mathematics researchers: cryptography in the quantum era
- The challenge of quantum computing to information security and our countermeasures
- Preventing the quantum crypto-apocalypse with linear algebra with errors
- Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
- Patent landscape in the field of hash-based post-quantum signatures (invited paper)
- Sustainable cryptography
- Quantum-assisted QD-CFS signatures
- Introduction to post-quantum cryptography
- Post-quantum primitives in information security
- A panorama of post-quantum cryptography
- Post-quantum key exchange for the Internet and the open quantum safe project
Uses Software
This page was built for publication: Post-quantum cryptography: state of the art
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803619)