Post-quantum cryptography

Results: 155



#Item
111New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC Masao KASAHARA  ∗

New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC Masao KASAHARA ∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-21 23:59:57
112The CRYPTREC Policy to Evaluate the Submitted Public Key Systems October 10, 2001 Tsutomu Matsumoto Chair, Public-Key Subcommittee

The CRYPTREC Policy to Evaluate the Submitted Public Key Systems October 10, 2001 Tsutomu Matsumoto Chair, Public-Key Subcommittee

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
113NTRUSign Introduced  December 2001 Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte

NTRUSign Introduced December 2001 Jeff Hoffstein, Nick Howgrave-Graham, Jill Pipher, Joe Silverman, William Whyte

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
114Report on Present State of NTRU Cryptosystem Evaluation (screening evaluation) January 28, 2002 Jun Kogure, Member

Report on Present State of NTRU Cryptosystem Evaluation (screening evaluation) January 28, 2002 Jun Kogure, Member

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
115ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

ALGEBRAIC CRYPTANALYSIS OF AES: AN OVERVIEW HARRIS NOVER Abstract. In this paper, we examine algebraic attacks on the Advanced Encryption Standard (AES, also known as Rijndael). We begin with a brief review of the histor

Add to Reading List

Source URL: www.math.wisc.edu

Language: English - Date: 2004-12-15 08:27:50
116CRYPTREC2001 Report on Present State of Asymmetric-Key Cryptographic Technique Evaluations January 28, 2002 Tsutomu Matsumoto,

CRYPTREC2001 Report on Present State of Asymmetric-Key Cryptographic Technique Evaluations January 28, 2002 Tsutomu Matsumoto,

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
117NIST Workshop on Cybersecurity in a Post-Quantum World

NIST Workshop on Cybersecurity in a Post-Quantum World

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2014-03-26 13:34:11
118Quantum and Post Quantum Cryptography Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France [removed] http://www.math.unicaen.fr/~nitaj

Quantum and Post Quantum Cryptography Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France [removed] http://www.math.unicaen.fr/~nitaj

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2012-11-25 08:41:10
119Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France Email: [removed]

Cryptanalysis of NTRU with two public keys Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme Universit´e de Caen, France Email: [removed]

Add to Reading List

Source URL: www.math.unicaen.fr

Language: English - Date: 2011-09-02 16:54:04
120References 1. ABA Bank Card Standard,

References 1. ABA Bank Card Standard, "Management and Use of Personal Information Numbers, " Aids from ABA, Catalog no[removed], American Bankers Association, [removed]ABA Document 4.3, "Key Management Standard," American

Add to Reading List

Source URL: www.ssl.stu.neva.ru

Language: English - Date: 2001-07-17 16:00:00