Post-quantum cryptography

Results: 155



#Item
131References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:42:48
132Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor

Preface The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long histor

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:45:18
133Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed]  17 December 2008

Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed] 17 December 2008

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2009-01-22 19:45:07
134SCIENCE NEWS PRIME[removed]JULIE REHMEYER ∫ MATH TREK

SCIENCE NEWS PRIME[removed]JULIE REHMEYER ∫ MATH TREK

Add to Reading List

Source URL: tuvalu.santafe.edu

Language: English - Date: 2011-08-30 17:13:56
135Efficient Implementations of Multivariate Quadratic Systems

Efficient Implementations of Multivariate Quadratic Systems

Add to Reading List

Source URL: crypto.rd.francetelecom.com

Language: English - Date: 2009-09-02 11:51:02
136Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware

Code-based Cryptography:Implementing the McEliece Scheme on Reconfigurable Hardware

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2010-04-20 22:07:38
137CMSS – An Improved Merkle Signature Scheme Johannes Buchmann1 , Luis Carlos Coronado Garc´ıa2 , Erik Dahmen1 , Martin D¨

CMSS – An Improved Merkle Signature Scheme Johannes Buchmann1 , Luis Carlos Coronado Garc´ıa2 , Erik Dahmen1 , Martin D¨

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2006-10-23 05:39:57
13812  Hidden Field Equations

12 Hidden Field Equations

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2004-10-11 07:37:09
139Making NTRU as Secure as Worst-Case Problems over Ideal Lattices Damien Stehlé1 and Ron Steinfeld2

Making NTRU as Secure as Worst-Case Problems over Ideal Lattices Damien Stehlé1 and Ron Steinfeld2

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2011-02-24 04:40:45
140

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2001-04-04 07:06:39