Post-quantum primitives in information security
From MaRDI portal
Publication:5118522
Recommendations
- Post-quantum cryptography: state of the art
- The challenge of quantum computing to information security and our countermeasures
- A panorama of post-quantum cryptography
- Computational problems in supersingular elliptic curve isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cited in
(6)- The challenge of quantum computing to information security and our countermeasures
- Vulnerability of cryptographic primitives based on the power conjugacy search problem in quantum computing
- Quantum algorithms for typical hard problems: a perspective of cryptanalysis
- Post-quantum cryptography: state of the art
- Post quantum cryptography from mutant prime knots
- A panorama of post-quantum cryptography
This page was built for publication: Post-quantum primitives in information security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5118522)