<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Ciphertext indistinguishability / Ring learning with errors / Chosen-plaintext attack / Learning with errors / Advantage / Lattice-based cryptography / Chosen-ciphertext attack / Digital signature / Ideal lattice cryptography / Semantic security
Date: 2018-07-25 08:38:21
Cryptography
Post-quantum cryptography
Ciphertext indistinguishability
Ring learning with errors
Chosen-plaintext attack
Learning with errors
Advantage
Lattice-based cryptography
Chosen-ciphertext attack
Digital signature
Ideal lattice cryptography
Semantic security

CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM Joppe Bos∗ , Léo Ducas† , Eike Kiltz‡ , Tancrède Lepoint§ , Vadim Lyubashevsky¶ , John M. Schanckk , Peter Schwabe∗∗ , Gregor Seiler†† , Damien

Add to Reading List

Source URL: cryptojedi.org

Download Document from Source Website

File Size: 450,18 KB

Share Document on Facebook

Similar Documents

Hash-based signatures Joost Rijneveld  Radboud University, Nijmegen, The Netherlands  Post-quantum cryptography

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

DocID: 1xVpf - View Document

Tenth International Conference on Post-Quantum Cryptography  PQCrypto 2019 Chongqing, China, May 8–10, 2019 pqcrypto2019.org

Tenth International Conference on Post-Quantum Cryptography PQCrypto 2019 Chongqing, China, May 8–10, 2019 pqcrypto2019.org

DocID: 1xVmD - View Document

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

DocID: 1xVaG - View Document

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

DocID: 1xTFq - View Document

F R A U N H O F E R I N S T I T U T E F O R S E C U R E I N F O R M AT I O N T E C H N O L O G Y  White Paper Practical Post-Quantum Cryptography

F R A U N H O F E R I N S T I T U T E F O R S E C U R E I N F O R M AT I O N T E C H N O L O G Y White Paper Practical Post-Quantum Cryptography

DocID: 1vqNn - View Document