Quantum attacks on public-key cryptosystems
From MaRDI portal
Publication:4933535
Recommendations
Cited in
(18)- Quantum attacks on Lai-Massey structure
- scientific article; zbMATH DE number 7259165 (Why is no real title available?)
- Quantum algorithms for typical hard problems: a perspective of cryptanalysis
- scientific article; zbMATH DE number 7259160 (Why is no real title available?)
- Formal verification of Saber's public-key encryption scheme in easycrypt
- Finite non-commutative associative algebras for setting the hidden discrete logarithm problem and post-quantum cryptoschemes on its base
- On the dimension of the subfield subcodes of 1-point Hermitian codes
- Quantum attacks on some Feistel block ciphers
- Cryptanalysis of schemes based on pseudoinverse matrix
- Commutative encryption method based on hidden logarithm problem
- A note on quantum related-key attacks
- scientific article; zbMATH DE number 5320301 (Why is no real title available?)
- Introduction to post-quantum cryptography
- Computational hardness of IFP and ECDLP
- International symposium on mathematics, quantum theory, and cryptography. Proceedings of MQC 2019, Fukuoka, Japan, September 25--27, 2019
- A panorama of post-quantum cryptography
- Quantum attacks on beyond-birthday-bound MACs
- McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks
This page was built for publication: Quantum attacks on public-key cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4933535)