Japanese ポスト量子暗号 Cited by user Tokie9832 on 28 Apr 2024 * On Ideal Lattices and Learning With Errors Over Rings * Kerberos Revisited: Quantum-Safe Authentication * The picnic signature scheme.
English Post-quantum cryptography Cited by user Citation bot on 18 Feb 2019 In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to…