Post-quantum cryptography

Known as: Post-quantum, PQcrypto, Quantum Safe Cryptography 
Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly… (More)
Is this relevant?
Highly Cited
2016
Highly Cited
2016
In recent years, there has been a substantial amount of research on quantum computers – machines that exploit quantum mechanical… (More)
  • table 1
Is this relevant?
2016
2016
Isogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In… (More)
Is this relevant?
2016
2016
As the development of a viable quantum computer nears, existing widely used public-key cryptosystems, such as RSA, will no longer… (More)
  • table I
  • figure 1
  • table II
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Earlier in 2015, Bos, Costello, Naehrig, and Stebila (IEEE Security & Privacy 2015) proposed an instantiation of Peikert’s… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2014
2014
Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental… (More)
  • table 5
  • table 6
  • table 7
  • table 8
  • figure 3
Is this relevant?
2013
2013
In this paper, we address the problem of achieving efficient code-based digital signatures with small public keys. The solution… (More)
Is this relevant?
Review
2010
Review
2010
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore… (More)
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Imagine that it’s fifteen years from now and someone announces the successful construction of a large quantum computer. The New… (More)
  • figure 1
  • figure 2
Is this relevant?
Review
2009
Review
2009
This survey provides a comparative overview of lattice-based signature schemes with respect to security and performance… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
Is this relevant?