Quantum resistant public key cryptography: a survey

@inproceedings{Perlner2009QuantumRP,
  title={Quantum resistant public key cryptography: a survey},
  author={Ray A. Perlner and D. Cooper},
  booktitle={IDtrust '09},
  year={2009}
}
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which currently used public key cryptographic algorithms are based. In this paper, we provide a survey of some of the public key cryptographic algorithms that have been developed that, while not currently in widespread use, are believed to be resistant to quantum computing based attacks and discuss some of the issues that… Expand
87 Citations
Code-Based Public-Key Encryption
  • 2
Quantum Safe Cryptography
  • 3
An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives
  • Chuck Easttom
  • Computer Science
  • 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC)
  • 2019
  • 5
Will quantum computers be the end of public key encryption?
  • 21
ELLIPTIC CURVE CRYPTOGRAPHY: PRE AND POST QUANTUM
  • 4
  • PDF
Report on Post-Quantum Cryptography
  • 296
  • PDF
Attacks on practical quantum key distribution systems (and how to prevent them)
  • 32
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-6 OF 6 REFERENCES
Use of Elliptic Curves in Cryptography
  • V. Miller
  • Mathematics, Computer Science
  • CRYPTO
  • 1985
  • 3,300
  • Highly Influential
  • PDF
Elliptic curve cryptosystems
  • 4,955
  • Highly Influential
  • PDF
NTRUSIGN: Digital Signatures Using the NTRU Lattice
  • 234
  • Highly Influential
A method for obtaining digital signatures and public-key cryptosystems
  • 10,084
  • Highly Influential
  • PDF
NSS: An NTRU Lattice-Based Signature Scheme
  • 117
  • Highly Influential
  • PDF
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
  • 894
  • Highly Influential
  • PDF