Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
63 KB (6,408 words) - 21:27, 9 April 2025
Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
39 KB (2,963 words) - 09:04, 19 March 2025
Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography...
81 KB (9,073 words) - 05:33, 17 April 2025
standalone encrypted calendar app. Tuta Mail has recently integrated post-quantum cryptography features through its new protocol - TutaCrypt replacing standard...
21 KB (1,900 words) - 02:40, 2 April 2025
Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It...
103 KB (11,879 words) - 02:19, 29 April 2025
proof. Lattice-based constructions support important standards of post-quantum cryptography. Unlike more widely used and known public-key schemes such as...
24 KB (2,852 words) - 05:01, 2 May 2025
In cryptography, Post-Quantum Extended Diffie–Hellman (PQXDH) is a Kyber-based post-quantum cryptography upgrade to the Diffie–Hellman key exchange. It...
3 KB (266 words) - 22:37, 29 September 2024
Symmetric-key algorithm (redirect from Symmetric key cryptography)
symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
15 KB (1,540 words) - 19:12, 22 April 2025
Grover's algorithm (redirect from Quantum partial search)
(2010). "Grover vs. McEliece" (PDF). In Sendrier, Nicolas (ed.). Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany...
32 KB (4,719 words) - 18:03, 30 April 2025
exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
99 KB (10,975 words) - 20:28, 3 April 2025
hash functions. It is of interest as a type of post-quantum cryptography. So far, hash-based cryptography is used to construct digital signatures schemes...
20 KB (2,329 words) - 22:48, 23 December 2024
Kyber (category Lattice-based cryptography)
trapdoor function. It won the NIST competition for the first post-quantum cryptography (PQ) standard. NIST calls its standard Module-Lattice-Based Key-Encapsulation...
15 KB (1,460 words) - 17:02, 5 March 2025
Harvest now, decrypt later (category Cryptography)
to concerns about the need to urgently deploy post-quantum cryptography, even though no practical quantum attacks yet exist, as some data stored now may...
4 KB (391 words) - 16:20, 12 April 2025
NTRU (redirect from HRSS (cryptography))
of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength, NTRU...
12 KB (1,215 words) - 21:39, 20 April 2025
Bernstein, Daniel J. (2009). "Introduction to post-quantum cryptography". Post-Quantum Cryptography. Berlin, Heidelberg: Springer. pp. 1–14. doi:10...
113 KB (12,416 words) - 14:08, 4 May 2025
Diffie–Hellman Key Exchange claimed to provide a post-quantum secure form of elliptic curve cryptography by using isogenies to implement Diffie–Hellman...
39 KB (4,676 words) - 10:16, 27 April 2025
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a...
40 KB (4,512 words) - 17:51, 26 March 2025
NewHope (category Post-quantum cryptography)
In post-quantum cryptography, NewHope is a key-agreement protocol by Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe that is designed to...
4 KB (412 words) - 18:18, 13 February 2025
development of quantum computing, quantum communication and quantum sensing. Quantum computing and communication are two sub-fields of quantum information...
48 KB (2,047 words) - 13:46, 3 May 2025
Encryption (redirect from Cryptography algorithm)
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
34 KB (3,645 words) - 17:52, 2 May 2025
algorithms for conventional computers. Post-quantum cryptography is the subfield of cryptography that aims to replace quantum-vulnerable algorithms with new ones...
12 KB (1,222 words) - 11:18, 7 February 2025
authenticated public classical channel. E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for...
5 KB (720 words) - 06:35, 18 August 2024
McEliece cryptosystem (category Post-quantum cryptography)
has never gained much acceptance in the cryptographic community, but is a candidate for "post-quantum cryptography", as it is immune to attacks using Shor's...
16 KB (2,092 words) - 01:14, 27 January 2025
increased investment in quantum computing research and the development of post-quantum cryptography to prepare for the fault-tolerant quantum computing (FTQC)...
7 KB (745 words) - 09:59, 31 March 2025
Ring learning with errors key exchange (category Post-quantum cryptography)
if such computers are implemented. RLWE-KEX is one of a set of post-quantum cryptographic algorithms which are based on the difficulty of solving certain...
23 KB (3,424 words) - 23:09, 30 August 2024
Ring learning with errors signature (category Post-quantum cryptography)
sized quantum computer. Post quantum cryptography is a class of cryptographic algorithms designed to be resistant to attack by a quantum cryptography. Several...
19 KB (2,570 words) - 16:32, 15 September 2024
of cryptographic algorithms promulgated by the National Security Agency as a replacement for NSA Suite B Cryptography until post-quantum cryptography standards...
9 KB (469 words) - 02:34, 21 October 2023
successful in quantum chemistry and have potential applications in various fields including physics, materials science, data science, cryptography, biology...
8 KB (737 words) - 08:49, 18 March 2025
Daniel J. Bernstein (section Cryptography)
Based Hash function. He is one of the editors of the 2009 book Post-Quantum Cryptography. Starting in the mid-1990s, Bernstein wrote a number of security-aware...
22 KB (1,973 words) - 03:58, 16 March 2025
One-time pad (category Cryptography)
independent. Quantum cryptography and post-quantum cryptography involve studying the impact of quantum computers on information security. Quantum computers...
55 KB (7,403 words) - 01:02, 10 April 2025