<--- Back to Details
First PageDocument Content
Quantum information science / Theoretical computer science / Quantum cryptography / Quantum computing / Cryptography / Quantum mechanics / Quantum algorithm / Quantum money / Quantum key distribution / Quantum information / Quantum entanglement / Ring learning with errors key exchange
Date: 2014-11-14 13:01:23
Quantum information science
Theoretical computer science
Quantum cryptography
Quantum computing
Cryptography
Quantum mechanics
Quantum algorithm
Quantum money
Quantum key distribution
Quantum information
Quantum entanglement
Ring learning with errors key exchange

Quantum Money from Hidden Subspaces

Add to Reading List

Source URL: theoryofcomputing.org

Download Document from Source Website

File Size: 456,33 KB

Share Document on Facebook

Similar Documents

Cryptography / Post-quantum cryptography / Public-key cryptography / Hashing / Error detection and correction / Digital signature / Hash chain / XMSS / Cryptographic hash function / Merkle tree / Hash function / Key

Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography

DocID: 1xVpf - View Document

Cryptography / Emerging technologies / Quantum computing / Quantum cryptography / Theoretical computer science / Post-quantum cryptography / Applied mathematics / Mathematics

Tenth International Conference on Post-Quantum Cryptography PQCrypto 2019 Chongqing, China, May 8–10, 2019 pqcrypto2019.org

DocID: 1xVmD - View Document

Emerging technologies / Quantum computing / Theoretical computer science / Quantum cryptography / Cryptography / Quantum information science / Technology / Applied mathematics / Post-quantum cryptography / Internet of things

Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands

DocID: 1xVaG - View Document

Cryptography / Post-quantum cryptography / Trusted Computing / Public-key cryptography / Quantum cryptography / Key size / Advanced Encryption Standard process

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

DocID: 1xTFq - View Document

F R A U N H O F E R I N S T I T U T E F O R S E C U R E I N F O R M AT I O N T E C H N O L O G Y White Paper Practical Post-Quantum Cryptography

DocID: 1vqNn - View Document