Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
65 KB (6,602 words) - 01:19, 10 July 2025
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
82 KB (9,126 words) - 16:08, 3 June 2025
Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
40 KB (3,015 words) - 16:14, 29 June 2025
proof. Lattice-based constructions support important standards of post-quantum cryptography. Unlike more widely used and known public-key schemes such as...
24 KB (2,872 words) - 22:30, 4 July 2025
Symmetric-key algorithm (redirect from Symmetric key cryptography)
symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
15 KB (1,540 words) - 21:14, 19 June 2025
In cryptography, Post-Quantum Extended Diffie–Hellman (PQXDH) is a Kyber-based post-quantum cryptography upgrade to the Diffie–Hellman key exchange. It...
3 KB (266 words) - 22:37, 29 September 2024
hash functions. It is of interest as a type of post-quantum cryptography. So far, hash-based cryptography is used to construct digital signatures schemes...
20 KB (2,329 words) - 03:24, 18 June 2025
Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It...
104 KB (11,926 words) - 21:44, 19 June 2025
Bernstein, Daniel J. (2009). "Introduction to post-quantum cryptography". Post-Quantum Cryptography. Berlin, Heidelberg: Springer. pp. 1–14. doi:10...
114 KB (12,489 words) - 07:15, 14 July 2025
Kyber (category Lattice-based cryptography)
trapdoor function. It won the NIST competition for the first post-quantum cryptography (PQ) standard. NIST calls its standard, numbered FIPS 203, Module-Lattice-Based...
15 KB (1,472 words) - 07:57, 9 July 2025
standalone encrypted calendar app. Tuta Mail has recently integrated post-quantum cryptography features through its new protocol - TutaCrypt replacing standard...
22 KB (2,008 words) - 11:53, 12 July 2025
exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
100 KB (11,093 words) - 07:02, 14 July 2025
Harvest now, decrypt later (category Cryptography)
to concerns about the need to urgently deploy post-quantum cryptography, even though no practical quantum attacks yet exist, as some data stored now may...
4 KB (391 words) - 16:20, 12 April 2025
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
40 KB (4,551 words) - 19:13, 12 July 2025
NTRU (redirect from HRSS (cryptography))
of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength, NTRU...
12 KB (1,215 words) - 21:39, 20 April 2025
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
39 KB (4,677 words) - 07:29, 27 June 2025
increased investment in quantum computing research and the development of post-quantum cryptography to prepare for the fault-tolerant quantum computing (FTQC)...
7 KB (757 words) - 10:54, 26 June 2025
would all be cracked quickly with a powerful quantum computer. "The keys used in public key cryptography have some mathematical structure. For example...
13 KB (1,517 words) - 22:31, 1 June 2025
NewHope (category Post-quantum cryptography)
In post-quantum cryptography, NewHope is a key-agreement protocol by Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe that is designed to...
4 KB (412 words) - 18:18, 13 February 2025
Ring learning with errors signature (category Post-quantum cryptography)
sized quantum computer. Post quantum cryptography is a class of cryptographic algorithms designed to be resistant to attack by a quantum cryptography. Several...
19 KB (2,570 words) - 18:15, 3 July 2025
of cryptographic algorithms promulgated by the National Security Agency as a replacement for NSA Suite B Cryptography until post-quantum cryptography standards...
9 KB (469 words) - 02:34, 21 October 2023
PKCS (redirect from Public-Key Cryptography Standards)
hardware and cloud services. Involvement of PKCS standards in post-quantum cryptography efforts, with NIST's ongoing standardization. Growing adoption...
10 KB (343 words) - 13:37, 3 March 2025
Encryption (redirect from Cryptography algorithm)
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
34 KB (3,645 words) - 13:17, 2 July 2025
authenticated public classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for...
5 KB (720 words) - 06:35, 18 August 2024
Grover's algorithm (redirect from Quantum partial search)
(2010). "Grover vs. McEliece" (PDF). In Sendrier, Nicolas (ed.). Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany...
31 KB (4,691 words) - 06:19, 7 July 2025
One-time pad (category Cryptography)
independent. Quantum cryptography and post-quantum cryptography involve studying the impact of quantum computers on information security. Quantum computers...
55 KB (7,400 words) - 23:41, 5 July 2025
elliptic curves. More recently he has been focusing his research on post-quantum cryptography, being one of the discoverers of quasi-dyadic codes and quasi-cyclic...
9 KB (833 words) - 22:01, 29 November 2024
algorithms for conventional computers. Post-quantum cryptography is the subfield of cryptography that aims to replace quantum-vulnerable algorithms with new ones...
12 KB (1,222 words) - 11:18, 7 February 2025
development of quantum computing, quantum communication and quantum sensing. Quantum computing and communication are two sub-fields of quantum information...
48 KB (2,044 words) - 20:24, 9 June 2025
Daniel J. Bernstein (section Cryptography)
Based Hash function. He is one of the editors of the 2009 book Post-Quantum Cryptography. Starting in the mid-1990s, Bernstein wrote a number of security-aware...
22 KB (1,938 words) - 21:58, 29 June 2025