• Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    65 KB (6,602 words) - 01:19, 10 July 2025
  • Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
    82 KB (9,126 words) - 16:08, 3 June 2025
  • Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
    40 KB (3,015 words) - 16:14, 29 June 2025
  • proof. Lattice-based constructions support important standards of post-quantum cryptography. Unlike more widely used and known public-key schemes such as...
    24 KB (2,872 words) - 22:30, 4 July 2025
  • Thumbnail for Symmetric-key algorithm
    symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • hash functions. It is of interest as a type of post-quantum cryptography. So far, hash-based cryptography is used to construct digital signatures schemes...
    20 KB (2,329 words) - 03:24, 18 June 2025
  • In cryptography, Post-Quantum Extended Diffie–Hellman (PQXDH) is a Kyber-based post-quantum cryptography upgrade to the Diffie–Hellman key exchange. It...
    3 KB (266 words) - 22:37, 29 September 2024
  • Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It...
    104 KB (11,926 words) - 21:44, 19 June 2025
  • Thumbnail for Quantum computing
    Bernstein, Daniel J. (2009). "Introduction to post-quantum cryptography". Post-Quantum Cryptography. Berlin, Heidelberg: Springer. pp. 1–14. doi:10...
    114 KB (12,489 words) - 07:15, 14 July 2025
  • Harvest now, decrypt later (category Cryptography)
    to concerns about the need to urgently deploy post-quantum cryptography, even though no practical quantum attacks yet exist, as some data stored now may...
    4 KB (391 words) - 16:20, 12 April 2025
  • Kyber (category Lattice-based cryptography)
    trapdoor function. It won the NIST competition for the first post-quantum cryptography (PQ) standard. NIST calls its standard, numbered FIPS 203, Module-Lattice-Based...
    15 KB (1,472 words) - 07:57, 9 July 2025
  • Thumbnail for Tuta (email)
    standalone encrypted calendar app. Tuta Mail has recently integrated post-quantum cryptography features through its new protocol - TutaCrypt replacing standard...
    22 KB (2,008 words) - 11:53, 12 July 2025
  • Thumbnail for Cryptography
    exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
    100 KB (11,093 words) - 07:02, 14 July 2025
  • Thumbnail for Public-key cryptography
    Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
    40 KB (4,551 words) - 19:13, 12 July 2025
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
    39 KB (4,677 words) - 07:29, 27 June 2025
  • NTRU (redirect from HRSS (cryptography))
    of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength, NTRU...
    12 KB (1,215 words) - 21:39, 20 April 2025
  • NewHope (category Post-quantum cryptography)
    In post-quantum cryptography, NewHope is a key-agreement protocol by Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe that is designed to...
    4 KB (412 words) - 18:18, 13 February 2025
  • would all be cracked quickly with a powerful quantum computer. "The keys used in public key cryptography have some mathematical structure. For example...
    13 KB (1,517 words) - 22:31, 1 June 2025
  • Ring learning with errors signature (category Post-quantum cryptography)
    sized quantum computer. Post quantum cryptography is a class of cryptographic algorithms designed to be resistant to attack by a quantum cryptography. Several...
    19 KB (2,570 words) - 18:15, 3 July 2025
  • increased investment in quantum computing research and the development of post-quantum cryptography to prepare for the fault-tolerant quantum computing (FTQC)...
    7 KB (757 words) - 10:54, 26 June 2025
  • hardware and cloud services. Involvement of PKCS standards in post-quantum cryptography efforts, with NIST's ongoing standardization. Growing adoption...
    10 KB (343 words) - 13:37, 3 March 2025
  • of cryptographic algorithms promulgated by the National Security Agency as a replacement for NSA Suite B Cryptography until post-quantum cryptography standards...
    9 KB (469 words) - 02:34, 21 October 2023
  • Thumbnail for Encryption
    In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
    34 KB (3,645 words) - 13:17, 2 July 2025
  • authenticated public classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for...
    5 KB (720 words) - 06:35, 18 August 2024
  • (2010). "Grover vs. McEliece" (PDF). In Sendrier, Nicolas (ed.). Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany...
    31 KB (4,691 words) - 06:19, 7 July 2025
  • Thumbnail for One-time pad
    One-time pad (category Cryptography)
    independent. Quantum cryptography and post-quantum cryptography involve studying the impact of quantum computers on information security. Quantum computers...
    55 KB (7,400 words) - 23:41, 5 July 2025
  • Thumbnail for Paulo S. L. M. Barreto
    elliptic curves. More recently he has been focusing his research on post-quantum cryptography, being one of the discoverers of quasi-dyadic codes and quasi-cyclic...
    9 KB (833 words) - 22:01, 29 November 2024
  • algorithms for conventional computers. Post-quantum cryptography is the subfield of cryptography that aims to replace quantum-vulnerable algorithms with new ones...
    12 KB (1,222 words) - 11:18, 7 February 2025
  • development of quantum computing, quantum communication and quantum sensing. Quantum computing and communication are two sub-fields of quantum information...
    48 KB (2,044 words) - 20:24, 9 June 2025
  • Thumbnail for Daniel J. Bernstein
    Based Hash function. He is one of the editors of the 2009 book Post-Quantum Cryptography. Starting in the mid-1990s, Bernstein wrote a number of security-aware...
    22 KB (1,938 words) - 21:58, 29 June 2025