Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
67 KB (6,893 words) - 20:11, 29 July 2025
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
82 KB (9,126 words) - 16:08, 3 June 2025
Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
40 KB (2,957 words) - 04:30, 20 July 2025
proof. Lattice-based constructions support important standards of post-quantum cryptography. Unlike more widely used and known public-key schemes such as...
24 KB (2,872 words) - 22:30, 4 July 2025
Symmetric-key algorithm (redirect from Symmetric key cryptography)
symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
15 KB (1,540 words) - 21:14, 19 June 2025
In cryptography, Post-Quantum Extended Diffie–Hellman (PQXDH) is a Kyber-based post-quantum cryptography upgrade to the Diffie–Hellman key exchange. It...
3 KB (266 words) - 22:37, 29 September 2024
Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It...
104 KB (11,929 words) - 03:48, 2 August 2025
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
40 KB (4,551 words) - 23:23, 28 July 2025
exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
101 KB (11,138 words) - 15:26, 1 August 2025
hash functions. It is of interest as a type of post-quantum cryptography. So far, hash-based cryptography is used to construct digital signatures schemes...
21 KB (2,347 words) - 22:07, 31 July 2025
Bernstein, Daniel J. (2009). "Introduction to post-quantum cryptography". Post-Quantum Cryptography. Berlin, Heidelberg: Springer. pp. 1–14. doi:10...
114 KB (12,509 words) - 15:55, 1 August 2025
Kyber (category Lattice-based cryptography)
trapdoor function. It won the NIST competition for the first post-quantum cryptography (PQ) standard. NIST calls its standard, numbered FIPS 203, Module-Lattice-Based...
15 KB (1,473 words) - 19:11, 24 July 2025
standalone encrypted calendar app. Tuta Mail has recently integrated post-quantum cryptography features through its new protocol - TutaCrypt replacing standard...
22 KB (2,008 words) - 23:26, 31 July 2025
Harvest now, decrypt later (category Cryptography)
to concerns about the need to urgently deploy post-quantum cryptography, even though no practical quantum attacks yet exist, as some data stored now may...
5 KB (424 words) - 23:25, 1 August 2025
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
39 KB (4,677 words) - 07:29, 27 June 2025
of cryptographic algorithms promulgated by the National Security Agency as a replacement for NSA Suite B Cryptography until post-quantum cryptography standards...
9 KB (469 words) - 02:34, 21 October 2023
NTRU (redirect from HRSS (cryptography))
of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength, NTRU...
12 KB (1,215 words) - 21:39, 20 April 2025
Ring learning with errors signature (category Post-quantum cryptography)
sized quantum computer. Post quantum cryptography is a class of cryptographic algorithms designed to be resistant to attack by a quantum cryptography. Several...
19 KB (2,570 words) - 18:15, 3 July 2025
PKCS (redirect from Public-Key Cryptography Standards)
hardware and cloud services. Involvement of PKCS standards in post-quantum cryptography efforts, with NIST's ongoing standardization. Growing adoption...
10 KB (343 words) - 13:37, 3 March 2025
Daniel J. Bernstein (section Cryptography)
Based Hash function. He is one of the editors of the 2009 book Post-Quantum Cryptography. Starting in the mid-1990s, Bernstein wrote a number of security-aware...
22 KB (1,938 words) - 21:58, 29 June 2025
suitable materials for quantum computer manufacturing. Majorana fermions may be a crucial missing material. Quantum cryptography devices are now available...
7 KB (754 words) - 06:56, 27 July 2025
NewHope (category Post-quantum cryptography)
In post-quantum cryptography, NewHope is a key-agreement protocol by Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe that is designed to...
4 KB (412 words) - 18:18, 13 February 2025
Shor's algorithm (redirect from Quantum factoring)
are secure from quantum computers, collectively called post-quantum cryptography. Given the high error rates of contemporary quantum computers and too...
40 KB (5,809 words) - 20:55, 1 August 2025
development of quantum computing, quantum communication and quantum sensing. Quantum computing and communication are two sub-fields of quantum information...
48 KB (2,044 words) - 20:24, 9 June 2025
Grover's algorithm (redirect from Quantum partial search)
(2010). "Grover vs. McEliece" (PDF). In Sendrier, Nicolas (ed.). Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany...
31 KB (4,708 words) - 10:49, 17 July 2025
Commercial National Security Algorithm Suite (category Cryptography standards)
the cryptographic base to protect US National Security Systems information up to the top secret level, while the NSA plans for a transition to quantum-resistant...
10 KB (655 words) - 20:05, 23 June 2025
NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface allows multiple sets of randomness...
29 KB (3,633 words) - 08:24, 16 April 2025
authenticated public classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for...
5 KB (720 words) - 06:35, 18 August 2024
McEliece cryptosystem (category Post-quantum cryptography)
has never gained much acceptance in the cryptographic community, but is a candidate for "post-quantum cryptography", as it is immune to attacks using Shor's...
16 KB (2,093 words) - 11:24, 4 July 2025
operates in the areas of artificial intelligence, quantum computing, autonomous robotics, cryptography, advanced materials, digital science, directed energy...
23 KB (1,786 words) - 11:00, 15 April 2025