![Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange](https://www.pdfsearch.io/img/606e1864b307590d2a46ada6ceab3cc8.jpg) Date: 2018-09-03 08:56:26Cryptography Post-quantum cryptography Quantum cryptography Emerging technologies Quantum computing Key Supersingular isogeny key exchange Ring learning with errors key exchange | | Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)Add to Reading ListSource URL: joostrijneveld.nlDownload Document from Source Website File Size: 374,14 KBShare Document on Facebook
|