21![Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven 17 September 2017 Post-quantum cryptography Tanja Lange slides jointly with Daniel J. Bernstein Technische Universiteit Eindhoven 17 September 2017](https://www.pdfsearch.io/img/8dcf404dd2567ae9bc6ccc7e5c28a437.jpg) | Add to Reading ListSource URL: hyperelliptic.orgLanguage: English - Date: 2017-10-22 12:24:16
|
---|
22![PQCRYPTO – Post-Quantum Cryptography for Long-term Security Tanja Lange 01 May 2015 Intel Workshop: International View of the PQCRYPTO – Post-Quantum Cryptography for Long-term Security Tanja Lange 01 May 2015 Intel Workshop: International View of the](https://www.pdfsearch.io/img/e8de05fdb7b3b3e961a48fcce29761f8.jpg) | Add to Reading ListSource URL: pqcrypto.eu.orgLanguage: English - Date: 2016-03-13 11:15:02
|
---|
23![Post-quantum key exchange for the TLS protocol from R-LWE Craig Costello MSR-T Security and Cryptography Group joint work with Joppe Bos (NXP), Michael Naehrig (MSR), Douglas Stebila (QUT) Post-quantum key exchange for the TLS protocol from R-LWE Craig Costello MSR-T Security and Cryptography Group joint work with Joppe Bos (NXP), Michael Naehrig (MSR), Douglas Stebila (QUT)](https://www.pdfsearch.io/img/dd4a4b1b75783a806d2062b52a88d4f9.jpg) | Add to Reading ListSource URL: www.craigcostello.com.auLanguage: English - Date: 2014-10-29 23:31:25
|
---|
24![Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards Standardization of post-quantum cryptography Tanja Lange 08 May 2016 A Workshop About Cryptographic Standards](https://www.pdfsearch.io/img/98905272fc4f5ffc8fe786e72e6b3c95.jpg) | Add to Reading ListSource URL: www.cryptoexperts.com- Date: 2016-05-30 09:49:30
|
---|
25![Microsoft PowerPoint - AWACS-PQC Microsoft PowerPoint - AWACS-PQC](https://www.pdfsearch.io/img/bca78270ca2826fb02be5340d939b870.jpg) | Add to Reading ListSource URL: www.cryptoexperts.comLanguage: English - Date: 2016-05-30 09:49:30
|
---|
26![Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1 Lattice Cryptography: A White Paper Daniele Micciancio∗ March 16, 2010 1](https://www.pdfsearch.io/img/a7163f2dd50ed420e34b64163e21c95a.jpg) | Add to Reading ListSource URL: thmatters.files.wordpress.comLanguage: English - Date: 2015-09-29 10:45:40
|
---|
27![Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics Parallel Implementation of BDD enumeration for LWE Elena Kirshanova, Alexander May, Friedrich Wiemer Horst G¨ ortz Institute for IT-Security Faculty of Mathematics](https://www.pdfsearch.io/img/1a221cb4a6a7088d2069e1f399417301.jpg) | Add to Reading ListSource URL: www.cits.rub.deLanguage: English - Date: 2016-06-24 05:04:33
|
---|
28![Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1 Post-quantum key exchange – a new hope Erdem Alkim1 , Léo Ducas2 , Thomas Pöppelmann3 , and Peter Schwabe4 ? 1](https://www.pdfsearch.io/img/632442feec25ad28c7c6800322701e16.jpg) | Add to Reading ListSource URL: cryptojedi.orgLanguage: English - Date: 2015-12-08 11:13:38
|
---|
29![Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal Submitted exclusively to the London Mathematical Society doi:Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal](https://www.pdfsearch.io/img/d81a714839aabf46f28e9aa2285bfdba.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2016-02-22 01:46:08
|
---|
30![ProvSec2015@Kanazawa Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders Katsuyuki Takashima ProvSec2015@Kanazawa Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders Katsuyuki Takashima](https://www.pdfsearch.io/img/ac40d900ead976fc0dccc7e6da841ec8.jpg) | Add to Reading ListSource URL: security-lab.jaist.ac.jpLanguage: English - Date: 2015-11-23 21:58:36
|
---|