<--- Back to Details
First PageDocument Content
Cryptography / Cryptanalysis / RSA / Quantum computing / Public-key cryptography / Symmetric-key algorithm / Cryptographic primitive / Stream cipher / Block cipher / One-way function / Chosen-plaintext attack / Cryptographic hash function
Cryptography
Cryptanalysis
RSA
Quantum computing
Public-key cryptography
Symmetric-key algorithm
Cryptographic primitive
Stream cipher
Block cipher
One-way function
Chosen-plaintext attack
Cryptographic hash function

Dartmouth College Computer Science Technical Report TR2002The Future of Cryptography Under Quantum Computers

Add to Reading List

Source URL: www.cs.dartmouth.edu

Download Document from Source Website

File Size: 232,75 KB

Share Document on Facebook

Similar Documents

Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128 Jean-Philippe Aumasson Itai Dinur Luca Henzen Willi Meier Adi Shamir

DocID: 1xToj - View Document

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina  August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

Attacks in Stream Ciphers: A Survey Gustavo Banegas Department of Computer Science, Federal University of Santa Catarina August 26, 2014 Applied Cryptography, Stream Cipher, Block Cipher, At

DocID: 1uEEQ - View Document

Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

Symmetric-Key Encryption: constructions Lecture 4 PRG, Stream Cipher

DocID: 1uwx4 - View Document

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

Sosemanuk, a fast software-oriented stream cipher∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T. Pornin7 and H. Sibert

DocID: 1uqni - View Document

On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

On the Hardware Implementation of the MICKEY-128 Stream Cipher Paris Kitsos2 ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY

DocID: 1sR8a - View Document