Post-Quantum Cryptography
From MaRDI portal
Publication:3532979
DOI10.1007/978-3-540-88702-7zbMath1155.81007OpenAlexW4297991408MaRDI QIDQ3532979
No author found.
Publication date: 29 October 2008
Full work available at URL: https://doi.org/10.1007/978-3-540-88702-7
Proceedings of conferences of miscellaneous specific interest (00B25) Quantum computation (81P68) Proceedings, conferences, collections, etc. pertaining to quantum theory (81-06)
Related Items (42)
Efficient key recovery for all HFE signature variants ⋮ On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields ⋮ SoK: how (not) to design and implement post-quantum cryptography ⋮ Reducing the Key Size of Rainbow Using Non-commutative Rings ⋮ Efficient Key Generation for Rainbow ⋮ Controlled quantum secure direct communication by entanglement distillation or generalized measurement ⋮ Unnamed Item ⋮ Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite ⋮ Sieving for Shortest Vectors in Lattices Using Angular Locality-Sensitive Hashing ⋮ A multivariate based threshold ring signature scheme ⋮ General linear group action on tensors: a candidate for post-quantum cryptography ⋮ Faster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive Hashing ⋮ Cryptanalysis of the CLR-cryptosystem ⋮ Efficient public-key operation in multivariate schemes ⋮ A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack ⋮ A security analysis of uniformly-layered Rainbow defined over non-commutative rings ⋮ An estimator for the hardness of the MQ problem ⋮ A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors ⋮ On the equivalence of two post-quantum cryptographic families ⋮ Cube-root-subgroups of \(\operatorname{SL}_2\) over imaginary quadratic integers ⋮ Authenticated communication from quantum readout of pufs ⋮ Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation ⋮ Quantum cryptography beyond quantum key distribution ⋮ On the geometry of cyclic lattices ⋮ Designing a Public Key Cryptosystem Based on Quasi-cyclic Subspace Subcodes of Reed-Solomon Codes ⋮ Secure two-party computation in a quantum world ⋮ Lattices from abelian extensions and error-correcting codes ⋮ Computational problems in supersingular elliptic curve isogenies ⋮ Optimum commutative group codes ⋮ Revisiting the Efficient Key Generation of ZHFE ⋮ A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials ⋮ An experimental comparison of some LLL-type lattice basis reduction algorithms ⋮ A Multivariate Encryption Scheme with Rainbow ⋮ Cryptanalysis of Riccati equation encryption schemes TP-I and TP-II ⋮ An LWE-based verifiable threshold secret sharing scheme ⋮ On the Berger - Loidreau Cryptosystem on the Tensor Product of Codes ⋮ On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack ⋮ A study on randomness used in signature generation of UOV ⋮ Unnamed Item ⋮ Survey of Lattice-Based Group Signature ⋮ An improved quantum algorithm for the quantum learning with errors problem ⋮ A multivariate quadratic challenge toward post-quantum generation cryptography
This page was built for publication: Post-Quantum Cryptography