First Page | Document Content | |
---|---|---|
Date: 2015-04-03 09:28:55Theoretical computer science Quantum cryptography Quantum computer Post-quantum cryptography Digital signature Quantum algorithm Key size Cryptographic primitive Elliptic curve cryptography Cryptography Public-key cryptography Key management | Evaluating Post-Quantum Asymmetric Cryptographic Algorithm CandidatesAdd to Reading ListSource URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 450,96 KBShare Document on Facebook |