Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
40 KB (3,015 words) - 16:22, 12 June 2025
Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
63 KB (6,418 words) - 03:08, 19 June 2025
Technology (NIST), specified that algorithms in its post-quantum cryptography competition support a minimum of 264 signatures safely. In 2022, NIST announced...
20 KB (2,329 words) - 03:24, 18 June 2025
Kyber (category Lattice-based cryptography)
Third Round of the NIST Post-Quantum Cryptography Standardization Process (PDF), Gaithersburg, MD, pp. NIST IR 8413, doi:10.6028/nist.ir.8413,...
15 KB (1,472 words) - 11:17, 9 June 2025
NTRU (redirect from HRSS (cryptography))
round of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength...
12 KB (1,215 words) - 21:39, 20 April 2025
solved efficiently. In 2024 NIST announced the Module-Lattice-Based Digital Signature Standard for post-quantum cryptography. In 1996, Miklós Ajtai introduced...
24 KB (2,853 words) - 16:44, 3 June 2025
McEliece cryptosystem (category Post-quantum cryptography)
has never gained much acceptance in the cryptographic community, but is a candidate for "post-quantum cryptography", as it is immune to attacks using Shor's...
16 KB (2,092 words) - 15:59, 4 June 2025
Victor S. Miller in 1985. Elliptic curve cryptography algorithms entered wide use in 2004 to 2005. In 1999, NIST recommended fifteen elliptic curves. Specifically...
39 KB (4,677 words) - 13:04, 20 May 2025
NewHope (category Post-quantum cryptography)
contestant in the NIST Post-Quantum Cryptography Standardization competition, and was used in Google's CECPQ1 experiment as a quantum-secure algorithm...
4 KB (412 words) - 18:18, 13 February 2025
NTRUSign (category Post-quantum cryptography)
A redesigned pqNTRUSign had been submitted to the NIST Post-Quantum Cryptography Standardization competition. It is based on "hash-and-sign" (contrasting...
6 KB (634 words) - 13:53, 30 May 2025
Falcon (signature scheme) (category Cryptography stubs)
and Crypnut blockchains. Post-quantum cryptography Lattice-based cryptography NTRU NIST Post-Quantum Cryptography Standardization Thomas Prest; Pierre-Alain...
4 KB (411 words) - 00:20, 3 April 2025
Daniel J. Bernstein (section Cryptography)
was one of four algorithms selected as winners of the NIST Post-Quantum Cryptography Standardization competition. It was the only hash-based algorithm of...
22 KB (1,938 words) - 20:58, 26 May 2025
Indistinguishability obfuscation Multivariate cryptography Post-quantum cryptography Quantum cryptography Steganography Visual cryptography Chaotic cryptology Japanese...
20 KB (1,901 words) - 07:15, 23 January 2025
execution, NIST recommends an iteration count of 10,000 or more.: 5.1.1.2 Avalanche effect Comparison of cryptographic hash functions Cryptographic agility...
49 KB (6,299 words) - 15:10, 30 May 2025
Symmetric-key algorithm (redirect from Symmetric key cryptography)
symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
15 KB (1,540 words) - 19:12, 22 April 2025
Server. He is a submitter of the Frodo post-quantum proposal to the NIST Post-Quantum Cryptography Standardization project. His leadership has also been...
5 KB (474 words) - 06:45, 29 July 2024
Key size (redirect from Cryptography/key length)
keylength calculator Articles discussing the implications of quantum computing NIST cryptographic toolkit Burt Kaliski: TWIRL and RSA key sizes (May 2003)...
29 KB (3,225 words) - 01:39, 6 June 2025
In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
13 KB (1,527 words) - 22:35, 14 June 2025
National Institute of Standards and Technology (redirect from Nist)
Retrieved October 19, 2023. "NIST Releases First 3 Finalized Post-Quantum Encryption Standards". NIST. August 13, 2024. "NIST Moonlight Data Will Help Satellites...
50 KB (4,845 words) - 19:13, 7 June 2025
Block cipher mode of operation (category Cryptographic algorithms)
which have not been approved by NIST. For example, CTS is ciphertext stealing mode and available in many popular cryptographic libraries. The block cipher...
52 KB (5,828 words) - 12:52, 13 June 2025
the performance implications, the NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface...
17 KB (1,979 words) - 23:02, 21 April 2025
Noise Protocol Framework (category Cryptographic primitives)
the Post-Quantum ones as the entries pre-date the NIST Post-Quantum Cryptography Standardization effort starting in 2016 with the first three Post Quantum...
75 KB (6,873 words) - 05:17, 13 June 2025
multivariate cryptography signature schemes (GeMMS, LUOV, Rainbow and MQDSS) have made their way into the 2nd round of the NIST post-quantum competition:...
8 KB (1,147 words) - 02:58, 17 April 2025
the performance implications, the NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface...
29 KB (3,633 words) - 08:24, 16 April 2025
PKCS (redirect from Public-Key Cryptography Standards)
services. Involvement of PKCS standards in post-quantum cryptography efforts, with NIST's ongoing standardization. Growing adoption of PKCS standards in the...
10 KB (343 words) - 13:37, 3 March 2025
Merkle signature scheme (category Post-quantum cryptography)
In hash-based cryptography, the Merkle signature scheme is a digital signature scheme based on Merkle trees (also called hash trees) and one-time signatures...
8 KB (1,453 words) - 01:08, 3 March 2025
Smith-Tone, Daniel. "Report on Post-Quantum Cryptography (NISTIR 8105)" (PDF). National Institute of Standards and Technology NIST. Retrieved 26 November 2018...
12 KB (1,222 words) - 11:18, 7 February 2025
Advanced Encryption Standard process (category Cryptography contests)
about NIST and the AES process." CAESAR Competition – Competition to design authenticated encryption schemes NIST hash function competition Post-Quantum Cryptography...
10 KB (1,040 words) - 10:14, 4 January 2025
Diffie–Hellman key exchange (redirect from New Directions in Cryptography)
Key-Establishment Schemes Using Discrete Logarithm Cryptography". National Institute of Standards and Technology. doi:10.6028/NIST.SP.800-56Ar3. Whitfield Diffie, Paul...
47 KB (5,367 words) - 13:57, 12 June 2025
exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
99 KB (11,007 words) - 11:28, 7 June 2025