Explore tens of thousands of sets crafted by our community.
Post-Quantum Cryptography
30
Flashcards
0/30
Code-based Cryptography
Builds on the hardness of the decoding problem for general linear codes, which hasn't been efficiently solved by quantum algorithms.
Boson Sampling
While not itself a cryptographic algorithm, Boson Sampling could demonstrate quantum advantage; post-quantum cryptography aims to resist such potential advancements.
Ring Learning with Errors (Ring-LWE)
A variant of LWE that uses ring structures, providing efficiency while maintaining hardness against quantum attacks.
Binary Field Cryptography
A form of code-based cryptography that uses binary Goppa codes to achieve quantum resistance.
Homomorphic Encryption
While not inherently quantum-resistant, some lattice-based homomorphic encryption schemes are designed to be secure against quantum computers.
Saber Cryptosystem
A lattice-based key encapsulation mechanism aiming for quantum resistance, predicated on the Module Learning with Rounding (Module-LWR) problem.
Learning with Rounding (LWR)
A deterministic variant of LWE offering resistance to quantum attacks and often enjoys performance improvements.
Picnic Signature Scheme
A post-quantum digital signature scheme that is secure under the assumption that certain symmetric key primitives are quantum-resistant.
NewHope
A key exchange protocol based on the Ring-LWE problem, designed to withstand threats posed by quantum computers.
Hash-based Cryptography
Relies on the security of hash functions, which quantum computers can't efficiently reverse due to the one-way property.
Peikert's Cryptosystem
A lattice-based cryptosystem designed to be secure against both classical and quantum computing threats.
Quantum Resistant Ledger (QRL)
A blockchain designed with post-quantum cryptography algorithms to be secure against an adversary using quantum computers.
Lattice-based Cryptography
Utilizes the computational hardness of lattice problems that are believed to be difficult for both classical and quantum computers.
Isogeny-based Cryptography
Rests on the challenge of finding isogenies between elliptic curves, which is a problem not yet solved by quantum algorithms.
McEliece Cryptosystem
Centered around the trapdoor one-way function nature of Goppa codes which resist quantum attacks due to the intractability of decoding an arbitrary linear code.
Supersingular Isogeny Diffie-Hellman (SIDH)
A key exchange protocol based on the difficulty of computing isogenies between supersingular elliptic curves, resisting quantum computer attacks.
Quantum Key Distribution (QKD)
Employs the principles of quantum mechanics, ensuring security through the detection of eavesdropping, as eavesdropping alters quantum states.
NTRU Cryptosystem
A lattice-based cryptosystem that remains secure under the assumption that certain lattice problems are hard for quantum computers.
Rainbow Cryptosystem
A multivariate public key cryptosystem (MPKC) designed to be secure against quantum attacks based on the hardness of the MQP problem.
Cryptographic Hash Functions
These functions are used in hash-based cryptography and, due to their one-way property, are not directly broken by quantum computers.
Sidelnikov Cryptosystem
A code-based cryptosystem that resists quantum attacks due to the difficulty of the syndrome decoding problem for classical and quantum computers alike.
HFE (Hidden Field Equations)
A cryptosystem based on the difficulty of solving systems of multivariate polynomial equations, considered to be secure against quantum adversaries.
Sphincs+
An advanced stateful hash-based post-quantum signature scheme that offsets the limitations of earlier hash-based approaches.
Multivariate Quadratic Polynomials (MQP)
Based on the difficulty of solving systems of multivariate quadratic equations, a problem which remains hard for quantum computers.
Learning with Errors (LWE)
A problem in lattice-based cryptography that involves solving linear equations with noisy solutions, resistant to known quantum attacks.
FrodoKEM
A key encapsulation mechanism based on the Learning with Errors (LWE) problem that aims to offer quantum resistance.
Module Learning with Errors (Module-LWE)
An extension of Ring-LWE that further increases efficiency and aims to retain resistance against quantum computers.
Dilithium Cryptosystem
A lattice-based digital signature scheme that is considered to be resilient to quantum computer-based attacks.
Kyber Cryptosystem
A key encapsulation mechanism that is part of the NIST post-quantum cryptography standardization process, designed to resist quantum cryptanalysis.
Quantum-Secure Symmetric Key Algorithms
While no symmetric algorithm is specifically quantum-proof, increasing key sizes can offer resistance to brute-force attacks from quantum computers.
© Hypatia.Tech. 2024 All rights reserved.