• Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    67 KB (6,893 words) - 20:11, 29 July 2025
  • Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
    82 KB (9,126 words) - 16:08, 3 June 2025
  • Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
    40 KB (2,957 words) - 04:30, 20 July 2025
  • proof. Lattice-based constructions support important standards of post-quantum cryptography. Unlike more widely used and known public-key schemes such as...
    24 KB (2,872 words) - 22:30, 4 July 2025
  • Thumbnail for Symmetric-key algorithm
    symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
    15 KB (1,540 words) - 21:14, 19 June 2025
  • In cryptography, Post-Quantum Extended Diffie–Hellman (PQXDH) is a Kyber-based post-quantum cryptography upgrade to the Diffie–Hellman key exchange. It...
    3 KB (266 words) - 22:37, 29 September 2024
  • Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It...
    104 KB (11,929 words) - 03:48, 2 August 2025
  • Thumbnail for Public-key cryptography
    Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
    40 KB (4,551 words) - 23:23, 28 July 2025
  • Thumbnail for Cryptography
    exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
    101 KB (11,138 words) - 15:26, 1 August 2025
  • hash functions. It is of interest as a type of post-quantum cryptography. So far, hash-based cryptography is used to construct digital signatures schemes...
    21 KB (2,347 words) - 22:07, 31 July 2025
  • Thumbnail for Quantum computing
    Bernstein, Daniel J. (2009). "Introduction to post-quantum cryptography". Post-Quantum Cryptography. Berlin, Heidelberg: Springer. pp. 1–14. doi:10...
    114 KB (12,509 words) - 15:55, 1 August 2025
  • Kyber (category Lattice-based cryptography)
    trapdoor function. It won the NIST competition for the first post-quantum cryptography (PQ) standard. NIST calls its standard, numbered FIPS 203, Module-Lattice-Based...
    15 KB (1,473 words) - 19:11, 24 July 2025
  • Thumbnail for Tuta (email)
    standalone encrypted calendar app. Tuta Mail has recently integrated post-quantum cryptography features through its new protocol - TutaCrypt replacing standard...
    22 KB (2,008 words) - 23:26, 31 July 2025
  • Harvest now, decrypt later (category Cryptography)
    to concerns about the need to urgently deploy post-quantum cryptography, even though no practical quantum attacks yet exist, as some data stored now may...
    5 KB (424 words) - 23:25, 1 August 2025
  • Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC...
    39 KB (4,677 words) - 07:29, 27 June 2025
  • of cryptographic algorithms promulgated by the National Security Agency as a replacement for NSA Suite B Cryptography until post-quantum cryptography standards...
    9 KB (469 words) - 02:34, 21 October 2023
  • NTRU (redirect from HRSS (cryptography))
    of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength, NTRU...
    12 KB (1,215 words) - 21:39, 20 April 2025
  • Ring learning with errors signature (category Post-quantum cryptography)
    sized quantum computer. Post quantum cryptography is a class of cryptographic algorithms designed to be resistant to attack by a quantum cryptography. Several...
    19 KB (2,570 words) - 18:15, 3 July 2025
  • hardware and cloud services. Involvement of PKCS standards in post-quantum cryptography efforts, with NIST's ongoing standardization. Growing adoption...
    10 KB (343 words) - 13:37, 3 March 2025
  • Thumbnail for Daniel J. Bernstein
    Based Hash function. He is one of the editors of the 2009 book Post-Quantum Cryptography. Starting in the mid-1990s, Bernstein wrote a number of security-aware...
    22 KB (1,938 words) - 21:58, 29 June 2025
  • suitable materials for quantum computer manufacturing. Majorana fermions may be a crucial missing material. Quantum cryptography devices are now available...
    7 KB (754 words) - 06:56, 27 July 2025
  • NewHope (category Post-quantum cryptography)
    In post-quantum cryptography, NewHope is a key-agreement protocol by Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe that is designed to...
    4 KB (412 words) - 18:18, 13 February 2025
  • are secure from quantum computers, collectively called post-quantum cryptography. Given the high error rates of contemporary quantum computers and too...
    40 KB (5,809 words) - 20:55, 1 August 2025
  • development of quantum computing, quantum communication and quantum sensing. Quantum computing and communication are two sub-fields of quantum information...
    48 KB (2,044 words) - 20:24, 9 June 2025
  • (2010). "Grover vs. McEliece" (PDF). In Sendrier, Nicolas (ed.). Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany...
    31 KB (4,708 words) - 10:49, 17 July 2025
  • Thumbnail for Commercial National Security Algorithm Suite
    Commercial National Security Algorithm Suite (category Cryptography standards)
    the cryptographic base to protect US National Security Systems information up to the top secret level, while the NSA plans for a transition to quantum-resistant...
    10 KB (655 words) - 20:05, 23 June 2025
  • NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface allows multiple sets of randomness...
    29 KB (3,633 words) - 08:24, 16 April 2025
  • authenticated public classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for...
    5 KB (720 words) - 06:35, 18 August 2024
  • McEliece cryptosystem (category Post-quantum cryptography)
    has never gained much acceptance in the cryptographic community, but is a candidate for "post-quantum cryptography", as it is immune to attacks using Shor's...
    16 KB (2,093 words) - 11:24, 4 July 2025
  • Thumbnail for Technology Innovation Institute
    operates in the areas of artificial intelligence, quantum computing, autonomous robotics, cryptography, advanced materials, digital science, directed energy...
    23 KB (1,786 words) - 11:00, 15 April 2025