Security comparisons and performance analyses of post-quantum signature algorithms
DOI10.1007/978-3-030-78375-4_17zbMath1492.81045OpenAlexW3172955269MaRDI QIDQ2117065
Yaroslav Balytskyi, Pranav Chandramouli, Xiaobo Zhou, Sang-Yoon Chang, Manohar Raavi, Simeon Wuthier
Publication date: 21 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-78375-4_17
performance analysisquantum computingsecurity analysispost-quantum cryptographypublic-key cipherdigital signature algorithmsquantum-resistant cryptography
Quantum computation (81P68) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Computational stability and error-correcting codes for quantum computation and communication processing (81P73)
Related Items (3)
Uses Software
Cites Work
- Unnamed Item
- Post-quantum key exchange for the Internet and the open quantum safe project
- Fault-tolerant quantum computation by anyons
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- Quantum computational networks
- Improved error bounds for the adiabatic approximation
- Rainbow, a New Multivariable Polynomial Signature Scheme
- On thermalization in Kitaev's 2D model
- A method for obtaining digital signatures and public-key cryptosystems
- Unbalanced Oil and Vinegar Signature Schemes
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- On Thermal Stability of Topological Qubit in Kitaev's 4D Model
- Lattice-Based Cryptography
This page was built for publication: Security comparisons and performance analyses of post-quantum signature algorithms