# Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography

@article{Nguyen2020IntuitiveUO, title={Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography}, author={Quan Thoi Minh Nguyen}, journal={ArXiv}, year={2020}, volume={abs/2003.09019} }

Post-quantum cryptography is inevitable. National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography (aka post-quantum cryptography). The reason is that investment in quantum computing is blooming which poses significant threats to our currently deployed cryptographic algorithms. As a security engineer, to prepare for the apocalypse in advance, I've been watching the development of quantum computers and post-quantum cryptography closely…

## References

SHOWING 1-10 OF 24 REFERENCES

### On lattices, learning with errors, random linear codes, and cryptography

- Computer ScienceSTOC '05
- 2005

A public-key cryptosystem whose hardness is based on the worst-case quantum hardness of SVP and SIVP, and an efficient solution to the learning problem implies a <i>quantum</i>, which can be made classical.

### Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

- Computer ScienceSIAM Rev.
- 1999

Efficient randomized algorithms are given for factoring integers and finding discrete logarithms, two problems that are generally thought to be hard on classical computers and that have been used as the basis of several proposed cryptosystems.

### AN EFFICIENT KEY RECOVERY ATTACK ON SIDH (PRELIMINARY VERSION)

- Computer Science, Mathematics
- 2022

This work presents an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman protocol (SIDH), based on a “glue-and-split” theorem due to Kani, which breaks the instantiation SIKEp434 in about one hour on a single core.

### Breaking Rainbow Takes a Weekend on a Laptop

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2022

New key recovery attacks against the Rainbow signature scheme are introduced, which is one of the three finalist signature schemes still in the NIST Post-Quantum Cryptography standardization project, and make a key-recovery practical for the SL 1 parameters.

### Quantum Mechanics and Quantum Computation

- Physics
- 2020

The book provides the basic concepts of quantum mechanics including postulates, operators, basic of formalism, quantum computation, virtual environment and biological simulations etc.

### Supersingular isogeny key exchange for beginners

- Mathematics, Computer ScienceIACR Cryptol. ePrint Arch.
- 2019

This is an informal tutorial on the supersingular isogeny Diffie-Hellman protocol aimed at non-isogenists.

### Hash-Based Signatures

- Computer Science, Mathematics
- 2019

This note describes a digital signature system based on cryptographic
hash functions, following the seminal work in this area of Lamport,
Diffie, Winternitz, and Merkle, as adapted by Leighton and…