Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Post-Quantum Cryptography

30

Flashcards

0/30

Still learning
StarStarStarStar

NTRU Cryptosystem

StarStarStarStar

A lattice-based cryptosystem that remains secure under the assumption that certain lattice problems are hard for quantum computers.

StarStarStarStar

Lattice-based Cryptography

StarStarStarStar

Utilizes the computational hardness of lattice problems that are believed to be difficult for both classical and quantum computers.

StarStarStarStar

Quantum Key Distribution (QKD)

StarStarStarStar

Employs the principles of quantum mechanics, ensuring security through the detection of eavesdropping, as eavesdropping alters quantum states.

StarStarStarStar

Boson Sampling

StarStarStarStar

While not itself a cryptographic algorithm, Boson Sampling could demonstrate quantum advantage; post-quantum cryptography aims to resist such potential advancements.

StarStarStarStar

Ring Learning with Errors (Ring-LWE)

StarStarStarStar

A variant of LWE that uses ring structures, providing efficiency while maintaining hardness against quantum attacks.

StarStarStarStar

Cryptographic Hash Functions

StarStarStarStar

These functions are used in hash-based cryptography and, due to their one-way property, are not directly broken by quantum computers.

StarStarStarStar

Supersingular Isogeny Diffie-Hellman (SIDH)

StarStarStarStar

A key exchange protocol based on the difficulty of computing isogenies between supersingular elliptic curves, resisting quantum computer attacks.

StarStarStarStar

Binary Field Cryptography

StarStarStarStar

A form of code-based cryptography that uses binary Goppa codes to achieve quantum resistance.

StarStarStarStar

Peikert's Cryptosystem

StarStarStarStar

A lattice-based cryptosystem designed to be secure against both classical and quantum computing threats.

StarStarStarStar

Learning with Errors (LWE)

StarStarStarStar

A problem in lattice-based cryptography that involves solving linear equations with noisy solutions, resistant to known quantum attacks.

StarStarStarStar

Hash-based Cryptography

StarStarStarStar

Relies on the security of hash functions, which quantum computers can't efficiently reverse due to the one-way property.

StarStarStarStar

Sidelnikov Cryptosystem

StarStarStarStar

A code-based cryptosystem that resists quantum attacks due to the difficulty of the syndrome decoding problem for classical and quantum computers alike.

StarStarStarStar

Quantum Resistant Ledger (QRL)

StarStarStarStar

A blockchain designed with post-quantum cryptography algorithms to be secure against an adversary using quantum computers.

StarStarStarStar

Module Learning with Errors (Module-LWE)

StarStarStarStar

An extension of Ring-LWE that further increases efficiency and aims to retain resistance against quantum computers.

StarStarStarStar

Learning with Rounding (LWR)

StarStarStarStar

A deterministic variant of LWE offering resistance to quantum attacks and often enjoys performance improvements.

StarStarStarStar

Isogeny-based Cryptography

StarStarStarStar

Rests on the challenge of finding isogenies between elliptic curves, which is a problem not yet solved by quantum algorithms.

StarStarStarStar

Code-based Cryptography

StarStarStarStar

Builds on the hardness of the decoding problem for general linear codes, which hasn't been efficiently solved by quantum algorithms.

StarStarStarStar

Multivariate Quadratic Polynomials (MQP)

StarStarStarStar

Based on the difficulty of solving systems of multivariate quadratic equations, a problem which remains hard for quantum computers.

StarStarStarStar

HFE (Hidden Field Equations)

StarStarStarStar

A cryptosystem based on the difficulty of solving systems of multivariate polynomial equations, considered to be secure against quantum adversaries.

StarStarStarStar

Kyber Cryptosystem

StarStarStarStar

A key encapsulation mechanism that is part of the NIST post-quantum cryptography standardization process, designed to resist quantum cryptanalysis.

StarStarStarStar

Rainbow Cryptosystem

StarStarStarStar

A multivariate public key cryptosystem (MPKC) designed to be secure against quantum attacks based on the hardness of the MQP problem.

StarStarStarStar

FrodoKEM

StarStarStarStar

A key encapsulation mechanism based on the Learning with Errors (LWE) problem that aims to offer quantum resistance.

StarStarStarStar

McEliece Cryptosystem

StarStarStarStar

Centered around the trapdoor one-way function nature of Goppa codes which resist quantum attacks due to the intractability of decoding an arbitrary linear code.

StarStarStarStar

Dilithium Cryptosystem

StarStarStarStar

A lattice-based digital signature scheme that is considered to be resilient to quantum computer-based attacks.

StarStarStarStar

Quantum-Secure Symmetric Key Algorithms

StarStarStarStar

While no symmetric algorithm is specifically quantum-proof, increasing key sizes can offer resistance to brute-force attacks from quantum computers.

StarStarStarStar

Homomorphic Encryption

StarStarStarStar

While not inherently quantum-resistant, some lattice-based homomorphic encryption schemes are designed to be secure against quantum computers.

StarStarStarStar

Picnic Signature Scheme

StarStarStarStar

A post-quantum digital signature scheme that is secure under the assumption that certain symmetric key primitives are quantum-resistant.

StarStarStarStar

Saber Cryptosystem

StarStarStarStar

A lattice-based key encapsulation mechanism aiming for quantum resistance, predicated on the Module Learning with Rounding (Module-LWR) problem.

StarStarStarStar

NewHope

StarStarStarStar

A key exchange protocol based on the Ring-LWE problem, designed to withstand threats posed by quantum computers.

StarStarStarStar

Sphincs+

StarStarStarStar

An advanced stateful hash-based post-quantum signature scheme that offsets the limitations of earlier hash-based approaches.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.