Post-quantum cryptography

Results: 155



#Item
91Let Live and Let Die — Handling the State of  Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:37:18
92Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Practical Lattice-based Digital Signature Schemes NIST Workshop on Cybersecurity in a Post-Quantum World J. Howe, T. Pöppelmann, M. O’Neill, E. O’Sullivan, T. Güneysu, V. Lyubashevsky

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 13:38:18
93Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† †  Aniket Kate‡

Post-Quantum Secure Onion Routing (Future Anonymity in Today’s Budget) Satrajit Ghosh† † Aniket Kate‡

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:34:21
94Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1  Counterpane Systems

Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
95MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems ⋆ Takanori Yasuda1 , Xavier Dahan1,6 , Yun-Ju Huang1,2 , Tsuyoshi Takagi1,3,4 , and Kouichi Sakurai1,5 1

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems ⋆ Takanori Yasuda1 , Xavier Dahan1,6 , Yun-Ju Huang1,2 , Tsuyoshi Takagi1,3,4 , and Kouichi Sakurai1,5 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 06:14:31
96Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont Secure Embedded Systems Center for Embedded Systems for Critical Applications

Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms Aydin Aysu, Patrick Schaumont Secure Embedded Systems Center for Embedded Systems for Critical Applications

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-26 21:36:12
97Toward Secure Implementation of McEliece Decryption Mariya Georgieva1 and Fr´ed´eric de Portzamparc1,2,3,4 Gemalto, 6 rue de la Verrerie 92190, Meudon, France1 INRIA, Paris-Rocquencourt Center2 , UPMC Univ Paris 06, UM

Toward Secure Implementation of McEliece Decryption Mariya Georgieva1 and Fr´ed´eric de Portzamparc1,2,3,4 Gemalto, 6 rue de la Verrerie 92190, Meudon, France1 INRIA, Paris-Rocquencourt Center2 , UPMC Univ Paris 06, UM

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 08:28:15
981  Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

1 Secure Random Linear Code Based Public Key Encryption Scheme RLCE Yongge Wang KINDI Center for Computing Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-31 03:22:40
99Accepted Papers-Workshop on Cybersecurity in a Post-Quantum World

Accepted Papers-Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-17 11:08:13
100NEWS  MAR[removed]No[removed]

NEWS MAR[removed]No[removed]

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2014-08-13 01:18:16