• Corpus ID: 214605650

Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography

@article{Nguyen2020IntuitiveUO,
  title={Intuitive Understanding of Quantum Computation and Post-Quantum Cryptography},
  author={Quan Thoi Minh Nguyen},
  journal={ArXiv},
  year={2020},
  volume={abs/2003.09019}
}
Post-quantum cryptography is inevitable. National Institute of Standards and Technology (NIST) starts standardizing quantum-resistant public-key cryptography (aka post-quantum cryptography). The reason is that investment in quantum computing is blooming which poses significant threats to our currently deployed cryptographic algorithms. As a security engineer, to prepare for the apocalypse in advance, I've been watching the development of quantum computers and post-quantum cryptography closely… 

References

SHOWING 1-10 OF 24 REFERENCES

Constructing Digital Signatures from a One Way Function

On lattices, learning with errors, random linear codes, and cryptography

A public-key cryptosystem whose hardness is based on the worst-case quantum hardness of SVP and SIVP, and an efficient solution to the learning problem implies a <i>quantum</i>, which can be made classical.

Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

  • P. Shor
  • Computer Science
    SIAM Rev.
  • 1999
Efficient randomized algorithms are given for factoring integers and finding discrete logarithms, two problems that are generally thought to be hard on classical computers and that have been used as the basis of several proposed cryptosystems.

AN EFFICIENT KEY RECOVERY ATTACK ON SIDH (PRELIMINARY VERSION)

This work presents an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman protocol (SIDH), based on a “glue-and-split” theorem due to Kani, which breaks the instantiation SIKEp434 in about one hour on a single core.

Breaking Rainbow Takes a Weekend on a Laptop

  • Ward Beullens
  • Computer Science, Mathematics
    IACR Cryptol. ePrint Arch.
  • 2022
New key recovery attacks against the Rainbow signature scheme are introduced, which is one of the three finalist signature schemes still in the NIST Post-Quantum Cryptography standardization project, and make a key-recovery practical for the SL 1 parameters.

Quantum Mechanics and Quantum Computation

The book provides the basic concepts of quantum mechanics including postulates, operators, basic of formalism, quantum computation, virtual environment and biological simulations etc.

Supersingular isogeny key exchange for beginners

  • Craig Costello
  • Mathematics, Computer Science
    IACR Cryptol. ePrint Arch.
  • 2019
This is an informal tutorial on the supersingular isogeny Diffie-Hellman protocol aimed at non-isogenists.

Hash-Based Signatures

This note describes a digital signature system based on cryptographic hash functions, following the seminal work in this area of Lamport, Diffie, Winternitz, and Merkle, as adapted by Leighton and

A public key cryptosystem based on algebraic coding theory

Code-Based Cryptography

  • N. Sendrier
  • Computer Science
    Encyclopedia of Cryptography and Security
  • 2011