Skip to search formSkip to main contentSkip to account menu

Post-quantum cryptography

Known as: Post-quantum, PQcrypto, Quantum Safe Cryptography 
Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
For 0 ≤ α ≤ 1/2, we show an algorithm that does the following. Given appropriate preprocessing P(ℒ) consisting of [EQUATION… 
2019
2019
Quantum computing is the study of computers that use quantum features in calculations. For over 20 years, it has been known that… 
2018
2018
Round5 is a Public Key Encryption and Key Encapsulation Mechanism (KEM) based on General Learning with Rounding (GLWR), a lattice… 
2018
2018
When implemented on real systems, cryptographic algorithms are vulnerable to attacks observing their execution behavior, such as… 
2017
2017
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is… 
2016
2016
In the present article, we propose the (p, q)-variant of beta function of second kind and establish a relation between the… 
Review
2015
Review
2015
The goal of Emission computed tomography (ECT) is to reconstruct the distribution of the radioisotopes in the body by measuring… 
2011
2011
Single-electronic transistor (SET) are considered as the attractive candidates for post-COMS VLSI due to their ultra-small size… 
2009
2009
McEliece scheme represents a code-based public-key cryptosystem. So far, this cryptosystem was not employed because of efficiency… 
2009
2009
Digital signatures are essential for the security of computer networks such as the Internet. For example, digital signatures are…