Quantum Key Distribution in the Classical Authenticated Key Exchange Framework (English)
- New search for: Mosca, Michele
- New search for: Stebila, Douglas
- New search for: Ustaoglu, Berkant
- New search for: Mosca, Michele
- New search for: Stebila, Douglas
- New search for: Ustaoglu, Berkant
In:
PQCrypto, International Workshop on Post-Quantum Cryptography, 5
;
136-154
;
2013
-
ISSN:
- Conference paper / Print
-
Title:Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
-
Contributors:
-
Published in:Lecture Notes in Computer Science ; 7932 ; 136-154
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2013
-
Size:19 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Using LDGM Codes and Sparse Syndromes to Achieve Digital SignaturesBaldi, M. / Bianchi, M. / Chiaraluce, F. / Rosenthal, J. / Schipani, D. et al. | 2013
- 16
-
Quantum Algorithms for the Subset-Sum ProblemBernstein, D.J. / Jeffery, S. / Lange, T. / Meurer, A. et al. | 2013
- 34
-
Improved Lattice-Based Threshold Ring Signature SchemeBettaieb, S. / Schrek, J. et al. | 2013
- 52
-
Degree of Regularity for HFEv and HFEv-Ding, J. / Yang, B.-Y. et al. | 2013
- 67
-
Software Speed Records for Lattice-Based SignaturesGuneysu, T. / Oder, T. / Poppelmann, T. / Schwabe, P. et al. | 2013
- 83
-
Solving the Shortest Vector Problem in Lattices Faster Using Quantum SearchLaarhoven, T. / Mosca, M. / van de Pol, J. et al. | 2013
- 102
-
An Efficient Attack of a McEliece Cryptosystem Variant Based on Convolutional CodesLandais, G. / Tillich, J.-P. et al. | 2013
- 118
-
Extended Algorithm for Solving Underdefined Multivariate Quadratic EquationsMiura, H. / Hashimoto, Y. / Takagi, T. et al. | 2013
- 136
-
Quantum Key Distribution in the Classical Authenticated Key Exchange FrameworkMosca, M. / Stebila, D. / Ustaoglu, B. et al. | 2013
- 155
-
Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature SchemeNie, X. / Xu, Z. / Buchmann, J. et al. | 2013
- 165
-
A Classification of Differential Invariants for Multivariate Post-quantum CryptosystemsPerlner, R. / Smith-Tone, D. et al. | 2013
- 174
-
Secure and Anonymous Hybrid Encryption from Coding TheoryPersichetti, E. et al. | 2013
- 188
-
Fast Verification for Improved Versions of the UOV and Rainbow Signature SchemesPetzoldt, A. / Bulygin, S. / Buchmann, J. et al. | 2013
- 203
-
The Hardness of Code Equivalence over F~q and Its Application to Code-Based CryptographySendrier, N. / Simos, D.E. et al. | 2013
- 217
-
Timing Attacks against the Syndrome Inversion in Code-Based CryptosystemsStrenzke, F. et al. | 2013
- 231
-
Simple Matrix Scheme for EncryptionTao, C. / Diene, A. / Tang, S. / Ding, J. et al. | 2013
- 243
-
Multivariate Signature Scheme Using Quadratic FormsYasuda, T. / Takagi, T. / Sakurai, K. et al. | 2013