Introduction to post-quantum cryptography
From MaRDI portal
Publication:3613265
DOI10.1007/978-3-540-88702-7_1zbMath1158.81311OpenAlexW2125093890MaRDI QIDQ3613265
Publication date: 12 March 2009
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-88702-7_1
Related Items (30)
Computational quantum key distribution (CQKD) on decentralized ledger and blockchain ⋮ Dual lattice attacks for closest vector problems (with preprocessing) ⋮ MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature ⋮ Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction ⋮ Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications] ⋮ On the hardnesses of several quantum decoding problems ⋮ Complete analysis of Simon's quantum algorithm with additional collisions ⋮ Delegating signing rights in a multivariate proxy signature scheme ⋮ Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology ⋮ Quantum mutual implicit authentication key agreement protocol without entanglement with key recycling ⋮ The weight distribution of codes over finite chain rings ⋮ Post-quantum verifiable random function from symmetric primitives in PoS blockchain ⋮ On the unique representation of very strong algebraic geometry codes ⋮ A note on quantum related-key attacks ⋮ Long term confidentiality: a survey ⋮ Quantum Cryptography: Key Distribution and Beyond ⋮ A framework for quantum-classical cryptographic translation ⋮ Total break of the SRP encryption scheme ⋮ Image encryption using complex hyper chaotic system by injecting impulse into parameters ⋮ Identity based blind signature scheme over NTRU lattices ⋮ An improved signature model of multivariate polynomial public key cryptosystem against key recovery attack ⋮ An efficient anti-quantum lattice-based blind signature for blockchain-enabled systems ⋮ The randomized slicer for CVPP: sharper, faster, smaller, batchier ⋮ The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes ⋮ Breaking Symmetric Cryptosystems Using Quantum Period Finding ⋮ Computer algebra tales on Goppa codes and McEliece cryptography ⋮ Lattice-based revocable certificateless signature ⋮ Unnamed Item ⋮ A new post-quantum voting protocol based on physical laws ⋮ Cryptographic one-way function based on boson sampling
This page was built for publication: Introduction to post-quantum cryptography