Introduction to post-quantum cryptography

From MaRDI portal
Publication:3613265

DOI10.1007/978-3-540-88702-7_1zbMath1158.81311OpenAlexW2125093890MaRDI QIDQ3613265

Daniel J. Bernstein

Publication date: 12 March 2009

Published in: Post-Quantum Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-88702-7_1




Related Items (30)

Computational quantum key distribution (CQKD) on decentralized ledger and blockchainDual lattice attacks for closest vector problems (with preprocessing)MQ Aggregate Signature Schemes with Exact Security Based on UOV SignatureCryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reductionImproved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x\) and some cryptographic applications] ⋮ On the hardnesses of several quantum decoding problemsComplete analysis of Simon's quantum algorithm with additional collisionsDelegating signing rights in a multivariate proxy signature schemeSecure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodologyQuantum mutual implicit authentication key agreement protocol without entanglement with key recyclingThe weight distribution of codes over finite chain ringsPost-quantum verifiable random function from symmetric primitives in PoS blockchainOn the unique representation of very strong algebraic geometry codesA note on quantum related-key attacksLong term confidentiality: a surveyQuantum Cryptography: Key Distribution and BeyondA framework for quantum-classical cryptographic translationTotal break of the SRP encryption schemeImage encryption using complex hyper chaotic system by injecting impulse into parametersIdentity based blind signature scheme over NTRU latticesAn improved signature model of multivariate polynomial public key cryptosystem against key recovery attackAn efficient anti-quantum lattice-based blind signature for blockchain-enabled systemsThe randomized slicer for CVPP: sharper, faster, smaller, batchierThe nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutesBreaking Symmetric Cryptosystems Using Quantum Period FindingComputer algebra tales on Goppa codes and McEliece cryptographyLattice-based revocable certificateless signatureUnnamed ItemA new post-quantum voting protocol based on physical lawsCryptographic one-way function based on boson sampling




This page was built for publication: Introduction to post-quantum cryptography