Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,649,969 papers from all fields of science
Search
Sign In
Create Free Account
Post-quantum cryptography
Known as:
Post-quantum
, PQcrypto
, Quantum Safe Cryptography
Expand
Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
BLISS signature scheme
Binary Goppa code
Cryptographic hash function
Cryptographic primitive
Expand
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A time-distance trade-off for GDD with preprocessing: instantiating the DLW heuristic
Noah Stephens-Davidowitz
Cybersecurity and Cyberforensics Conference
2019
Corpus ID: 67855328
For 0 ≤ α ≤ 1/2, we show an algorithm that does the following. Given appropriate preprocessing P(ℒ) consisting of [EQUATION…
Expand
2019
2019
The Transition from Classical to Post-Quantum Cryptography
P. Hoffman
2019
Corpus ID: 65072224
Quantum computing is the study of computers that use quantum features in calculations. For over 20 years, it has been known that…
Expand
2018
2018
Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M
Markku-Juhani O. Saarinen
,
S. Bhattacharya
,
Óscar García-Morchón
,
R. Rietman
,
L. Tolhuizen
,
Zhenfei Zhang
IACR Cryptology ePrint Archive
2018
Corpus ID: 52034028
Round5 is a Public Key Encryption and Key Encapsulation Mechanism (KEM) based on General Learning with Rounding (GLWR), a lattice…
Expand
2018
2018
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
A. Facon
,
S. Guilley
,
Matthieu Lec'Hvien
,
Alexander Schaub
,
Youssef Souissi
International Verification and Security Workshop
2018
Corpus ID: 53018853
When implemented on real systems, cryptographic algorithms are vulnerable to attacks observing their execution behavior, such as…
Expand
2017
2017
Bounding the Cache-Side-Channel Leakage of Lattice-Based Signature Schemes Using Program Semantics
Nina Bindel
,
J. Buchmann
,
Juliane Krämer
,
H. Mantel
,
Johannes Schickel
,
Alexandra Weber
Foundations and Practice of Security
2017
Corpus ID: 981791
In contrast to classical signature schemes, such as RSA or ECDSA signatures, the lattice-based signature scheme ring-TESLA is…
Expand
2016
2016
(p,q)-Type beta functions of second kind
A. Aral
,
Vijay Gupta
2016
Corpus ID: 126252951
In the present article, we propose the (p, q)-variant of beta function of second kind and establish a relation between the…
Expand
Review
2015
Review
2015
Filtered-based expectation ߞ Maximization algorithm for Emission computed tomography (ECT) image reconstruction
Abdelwahhab Boudjelal
,
Bilal Attallah
,
Z. Messali
International Conference on Control, Engineering…
2015
Corpus ID: 16256630
The goal of Emission computed tomography (ECT) is to reconstruct the distribution of the radioisotopes in the body by measuring…
Expand
2011
2011
A model for energy quantization of single-electron transistor below 10nm
Xiaobao Chen
,
Zuocheng Xing
,
Bingcai Sui
9th IEEE International Conference on ASIC
2011
Corpus ID: 1441251
Single-electronic transistor (SET) are considered as the attractive candidates for post-COMS VLSI due to their ultra-small size…
Expand
2009
2009
A Novel Processor Architecture for McEliece Cryptosystem and FPGA Platforms
Abdulhadi Shoufan
,
Thorsten Wink
,
Gregor Molter
,
S. Huss
,
Falko Strentzke
IEEE International Conference on Application…
2009
Corpus ID: 12225853
McEliece scheme represents a code-based public-key cryptosystem. So far, this cryptosystem was not employed because of efficiency…
Expand
2009
2009
Post-quantum signatures for today
Erik Dahmen
2009
Corpus ID: 16881662
Digital signatures are essential for the security of computer networks such as the Internet. For example, digital signatures are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE