Post-Quantum Cryptography

From MaRDI portal
Publication:3532979

DOI10.1007/978-3-540-88702-7zbMath1155.81007OpenAlexW4297991408MaRDI QIDQ3532979

No author found.

Publication date: 29 October 2008

Full work available at URL: https://doi.org/10.1007/978-3-540-88702-7




Related Items (42)

Efficient key recovery for all HFE signature variantsOn multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fieldsSoK: how (not) to design and implement post-quantum cryptographyReducing the Key Size of Rainbow Using Non-commutative RingsEfficient Key Generation for RainbowControlled quantum secure direct communication by entanglement distillation or generalized measurementUnnamed ItemFast Discretized Gaussian Sampling and Post-quantum TLS CiphersuiteSieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive HashingA multivariate based threshold ring signature schemeGeneral linear group action on tensors: a candidate for post-quantum cryptographyFaster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive HashingCryptanalysis of the CLR-cryptosystemEfficient public-key operation in multivariate schemesA detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attackA security analysis of uniformly-layered Rainbow defined over non-commutative ringsAn estimator for the hardness of the MQ problemA Key Recovery Attack on MDPC with CCA Security Using Decoding ErrorsOn the equivalence of two post-quantum cryptographic familiesCube-root-subgroups of \(\operatorname{SL}_2\) over imaginary quadratic integersAuthenticated communication from quantum readout of pufsSide channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementationQuantum cryptography beyond quantum key distributionOn the geometry of cyclic latticesDesigning a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon CodesSecure two-party computation in a quantum worldLattices from abelian extensions and error-correcting codesComputational problems in supersingular elliptic curve isogeniesOptimum commutative group codesRevisiting the Efficient Key Generation of ZHFEA novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomialsAn experimental comparison of some LLL-type lattice basis reduction algorithmsA Multivariate Encryption Scheme with RainbowCryptanalysis of Riccati equation encryption schemes TP-I and TP-IIAn LWE-based verifiable threshold secret sharing schemeOn the Berger - Loidreau Cryptosystem on the Tensor Product of CodesOn Provable Security of UOV and HFE Signature Schemes against Chosen-Message AttackA study on randomness used in signature generation of UOVUnnamed ItemSurvey of Lattice-Based Group SignatureAn improved quantum algorithm for the quantum learning with errors problemA multivariate quadratic challenge toward post-quantum generation cryptography




This page was built for publication: Post-Quantum Cryptography