• Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
    40 KB (3,015 words) - 16:22, 12 June 2025
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    63 KB (6,418 words) - 03:08, 19 June 2025
  • Technology (NIST), specified that algorithms in its post-quantum cryptography competition support a minimum of 264 signatures safely. In 2022, NIST announced...
    20 KB (2,329 words) - 03:24, 18 June 2025
  • Kyber (category Lattice-based cryptography)
    Third Round of the NIST Post-Quantum Cryptography Standardization Process (PDF), Gaithersburg, MD, pp. NIST IR 8413, doi:10.6028/nist.ir.8413,...
    15 KB (1,472 words) - 11:17, 9 June 2025
  • NTRU (redirect from HRSS (cryptography))
    round of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength...
    12 KB (1,215 words) - 21:39, 20 April 2025
  • Victor S. Miller in 1985. Elliptic curve cryptography algorithms entered wide use in 2004 to 2005. In 1999, NIST recommended fifteen elliptic curves. Specifically...
    39 KB (4,677 words) - 13:04, 20 May 2025
  • McEliece cryptosystem (category Post-quantum cryptography)
    has never gained much acceptance in the cryptographic community, but is a candidate for "post-quantum cryptography", as it is immune to attacks using Shor's...
    16 KB (2,092 words) - 15:59, 4 June 2025
  • solved efficiently. In 2024 NIST announced the Module-Lattice-Based Digital Signature Standard for post-quantum cryptography. In 1996, Miklós Ajtai introduced...
    24 KB (2,853 words) - 16:44, 3 June 2025
  • NewHope (category Post-quantum cryptography)
    contestant in the NIST Post-Quantum Cryptography Standardization competition, and was used in Google's CECPQ1 experiment as a quantum-secure algorithm...
    4 KB (412 words) - 18:18, 13 February 2025
  • NTRUSign (category Post-quantum cryptography)
    A redesigned pqNTRUSign had been submitted to the NIST Post-Quantum Cryptography Standardization competition. It is based on "hash-and-sign" (contrasting...
    6 KB (634 words) - 13:53, 30 May 2025
  • Falcon (signature scheme) (category Cryptography stubs)
    and Crypnut blockchains. Post-quantum cryptography Lattice-based cryptography NTRU NIST Post-Quantum Cryptography Standardization Thomas Prest; Pierre-Alain...
    4 KB (411 words) - 00:20, 3 April 2025
  • Thumbnail for Daniel J. Bernstein
    was one of four algorithms selected as winners of the NIST Post-Quantum Cryptography Standardization competition. It was the only hash-based algorithm of...
    22 KB (1,938 words) - 20:58, 26 May 2025
  • Thumbnail for Symmetric-key algorithm
    symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
    15 KB (1,540 words) - 19:12, 22 April 2025
  • keylength calculator Articles discussing the implications of quantum computing NIST cryptographic toolkit Burt Kaliski: TWIRL and RSA key sizes (May 2003)...
    29 KB (3,225 words) - 01:39, 6 June 2025
  • Thumbnail for Cryptographic hash function
    execution, NIST recommends an iteration count of 10,000 or more.: 5.1.1.2  Avalanche effect Comparison of cryptographic hash functions Cryptographic agility...
    49 KB (6,299 words) - 15:10, 30 May 2025
  • Indistinguishability obfuscation Multivariate cryptography Post-quantum cryptography Quantum cryptography Steganography Visual cryptography Chaotic cryptology Japanese...
    20 KB (1,901 words) - 07:15, 23 January 2025
  • Server. He is a submitter of the Frodo post-quantum proposal to the NIST Post-Quantum Cryptography Standardization project. His leadership has also been...
    5 KB (474 words) - 06:45, 29 July 2024
  • Thumbnail for Block cipher mode of operation
    Block cipher mode of operation (category Cryptographic algorithms)
    which have not been approved by NIST. For example, CTS is ciphertext stealing mode and available in many popular cryptographic libraries. The block cipher...
    52 KB (5,828 words) - 12:52, 13 June 2025
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,527 words) - 22:35, 14 June 2025
  • the performance implications, the NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface...
    17 KB (1,979 words) - 23:02, 21 April 2025
  • Retrieved October 19, 2023. "NIST Releases First 3 Finalized Post-Quantum Encryption Standards". NIST. August 13, 2024. "NIST Moonlight Data Will Help Satellites...
    50 KB (4,845 words) - 19:13, 7 June 2025
  • multivariate cryptography signature schemes (GeMMS, LUOV, Rainbow and MQDSS) have made their way into the 2nd round of the NIST post-quantum competition:...
    8 KB (1,147 words) - 02:58, 17 April 2025
  • Noise Protocol Framework (category Cryptographic primitives)
    the Post-Quantum ones as the entries pre-date the NIST Post-Quantum Cryptography Standardization effort starting in 2016 with the first three Post Quantum...
    75 KB (6,873 words) - 05:17, 13 June 2025
  • Smith-Tone, Daniel. "Report on Post-Quantum Cryptography (NISTIR 8105)" (PDF). National Institute of Standards and Technology NIST. Retrieved 26 November 2018...
    12 KB (1,222 words) - 11:18, 7 February 2025
  • services. Involvement of PKCS standards in post-quantum cryptography efforts, with NIST's ongoing standardization. Growing adoption of PKCS standards in the...
    10 KB (343 words) - 13:37, 3 March 2025
  • Merkle signature scheme (category Post-quantum cryptography)
    In hash-based cryptography, the Merkle signature scheme is a digital signature scheme based on Merkle trees (also called hash trees) and one-time signatures...
    8 KB (1,453 words) - 01:08, 3 March 2025
  • Thumbnail for Cryptography
    exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
    99 KB (11,007 words) - 11:28, 7 June 2025
  • Advanced Encryption Standard process (category Cryptography contests)
    about NIST and the AES process." CAESAR Competition – Competition to design authenticated encryption schemes NIST hash function competition Post-Quantum Cryptography...
    10 KB (1,040 words) - 10:14, 4 January 2025
  • Competition to design authenticated encryption schemes Post-Quantum Cryptography Standardization "Federal Register / Vol. 72, No. 212" (PDF). Federal Register...
    27 KB (2,244 words) - 07:44, 6 June 2025
  • Thumbnail for Diffie–Hellman key exchange
    Key-Establishment Schemes Using Discrete Logarithm Cryptography". National Institute of Standards and Technology. doi:10.6028/NIST.SP.800-56Ar3. Whitfield Diffie, Paul...
    47 KB (5,367 words) - 13:57, 12 June 2025