About 51 results
Open links in new tab
  1. Post-Quantum in 2017

    Home page of PQCRYPTO EU-Project You might be looking for one of the following events.

  2. Videos for Summer School on Post-Quantum Cryptography 2017

    Tanja Lange: "Introduction to post-quantum cryptography" Download WebM (1280x720 VP8 video, Vorbis audio, 81994008 bytes) Download MP4 (1280x720 H.264 video, MP3 audio, …

  3. PQCrypto 2017

    The conference will be preceded by a Summer School on Post-Quantum Cryptography (organized by the H2020 project PQCRYPTO) which will run June 19–23, 2017 and an Executive School …

  4. Cryptography Motivation #1: Communication channels are spying on our data. Motivation #2: Communication channels are modifying our data. Sender Untrustworthy network \Alice" \Eve" …

  5. PQCrypto 2017

    Home page of PQCRYPTO EU-Project Fast Lattice-Based Encryption: Stretching SPRING Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque, and Paul Kirchner Revisiting …

  6. Public key: P = S F T supposed to look like a random system Private key: S, F, T allows to invert the public key

  7. Assuming that the knowledge of the linear expansion does not reveal the code structure: The linear expansion is public and anyone can encrypt The decoder is known to the legitimate user …

  8. Attacker can log in remotely (ssh) Some attacks work by measuring network delays Attacker does not even need an account on the target machine

  9. Many “advanced” primitives can be based on these hardness assumptions

  10. Show a detailed how recover a fully functional private key for ZHFE from the public key. Estimate the complexity of this attack