Post-Quantum Cryptography: State of the Art
- 18 March 2016
- book chapter
- other
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 59 references indexed in Scilit:
- A multivariate based threshold ring signature schemeApplicable Algebra in Engineering, Communication and Computing, 2013
- The hardness of the closest vector problem with preprocessingIEEE Transactions on Information Theory, 2001
- NTRU: A ring-based public key cryptosystemLecture Notes in Computer Science, 1998
- Strengths and Weaknesses of Quantum ComputingSIAM Journal on Computing, 1997
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum ComputerSIAM Journal on Computing, 1997
- Factoring integers with the number field sieveLecture Notes in Mathematics, 1993
- Elliptic curve cryptosystemsMathematics of Computation, 1987
- Factoring polynomials with rational coefficientsMathematische Annalen, 1982
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976