Search results

Jump to navigation Jump to search
Results 1 – 21 of 658
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • * The day that cryptographic algorithms become [[Post-quantum cryptography|vulnerable to quantum computing]]. ...
    380 bytes (52 words) - 18:32, 10 April 2025
  • *[[Quantum Resistant Ledger]], a blockchain solution utilizing Post-Quantum Cryptography (PQC) ...
    575 bytes (86 words) - 00:22, 19 April 2024
  • [[Quantum cryptography]] devices are now available for commercial use. The [[one time pad]], a cip ...link.springer.com/chapter/10.1007/978-3-030-44223-1_23 |title=Post-Quantum Cryptography |series=Lecture Notes in Computer Science |language=en |location=Cham |publ ...
    7 KB (930 words) - 10:54, 26 June 2025
  • ...SRC {{!}} CSRC|url=https://content.csrc.e1a.nist.gov/projects/post-quantum-cryptography|access-date=2021-03-09|website=CSRC {{!}} NIST|language=EN-US}}{{Dead link| ...
    5 KB (713 words) - 06:45, 29 July 2024
  • * Module-Lattice cryptography: ..., the [[Module-Lattice-Based Digital Signature Standard]] for post-quantum cryptography ...
    3 KB (345 words) - 12:11, 31 October 2025
  • {{short description|IEEE standardization project for public-key cryptography}} ...nd Electronics Engineers]] (IEEE) standardization project for [[public-key cryptography]]. It includes specifications for: ...
    6 KB (678 words) - 03:54, 31 July 2024
  • * [[Freshness (cryptography)]], certainty that replayed messages in a replay attack on a protocol will ...
    341 bytes (40 words) - 14:10, 17 January 2019
  • {{Short description|NTRU public-key cryptography digital signature algorithm}} ...o known as the '''NTRU Signature Algorithm''', is an [[NTRU]] [[public-key cryptography]] [[digital signature]] algorithm based on the [[GGH signature scheme]]. Th ...
    6 KB (798 words) - 13:53, 30 May 2025
  • * [[quantum cryptography]] and computational complexity ...
    6 KB (800 words) - 18:15, 30 June 2025
  • '''NSA Suite B Cryptography''' was a set of cryptographic algorithms [[Promulgation|promulgated]] by th ...bruary 2005. A corresponding set of unpublished algorithms, [[NSA Suite A Cryptography|Suite A]], is "used in applications where Suite B may not be appropriate. B ...
    9 KB (1,200 words) - 15:23, 23 December 2024
  • {{Short description|Cryptography practises of the USA's National Security Agency}} The vast majority of the [[National Security Agency]]'s work on [[cryptography|encryption]] is [[classified information|classified]], but from time to tim ...
    9 KB (1,112 words) - 02:34, 21 October 2023
  • ...uk }}</ref> He is an international expert on [[quantum optics]], [[quantum cryptography]] and quantum communication using single [[photon]]s and [[Quantum entangle ...n University, Munich in 2002 successfully demonstrated an open air quantum cryptography experiment over a distance of 23.4&nbsp;km. ...
    9 KB (1,234 words) - 07:45, 3 June 2025
  • {{Short description|Public-key cryptosystem that uses lattice-based cryptography}} ...ublic-key cryptography|public-key cryptosystem]] that uses [[lattice-based cryptography]] to encrypt and decrypt data. It consists of two algorithms: [[NTRUEncrypt ...
    12 KB (1,640 words) - 21:39, 20 April 2025
  • |fields = [[Physics]]<br>[[Cryptography]] |known_for = [[Quantum cryptography]]<br>[[Quantum_key_distribution#E91_protocol:_Artur_Ekert_(1991)|E91 protoc ...
    15 KB (1,784 words) - 09:16, 16 May 2025
  • In [[cryptography]], the '''McEliece cryptosystem''' is an [[asymmetric encryption]] algorith ...nce in the cryptographic community, but is a candidate for "[[post-quantum cryptography]]", as it is immune to attacks using [[Shor's algorithm]] and – more genera ...
    16 KB (2,274 words) - 15:59, 4 June 2025
  • {{Short description|Group of public-key cryptography standards}} {{About|public-key cryptography standards|the human gene involved in cholesterol metabolism|PCSK9}} ...
    10 KB (1,242 words) - 13:37, 3 March 2025
  • | fields = [[Cryptography]] ...tographic hash functions]], [[Pairing-based cryptography]], [[Post-quantum cryptography]] ...
    9 KB (1,181 words) - 22:01, 29 November 2024
  • ...=Daniel J. |last2=Lange |first2=Tanja |date=2017-09-14 |title=Post-quantum cryptography |url=http://www.nature.com/articles/nature23461 |journal=Nature |language=e ...ock cipher]]s.<ref>{{cite book |last = Pelzl & Paar |title = Understanding Cryptography |url = https://archive.org/details/understandingcry00paar |url-access = lim ...
    15 KB (2,060 words) - 19:04, 21 September 2025
  • ...n exportable mass market software at the time. CSPs implementing stronger cryptography were available only to U.S. residents, unless the CSPs themselves had recei ...ptography. The main use of third-party CSPs is to interface with external cryptography hardware such as [[hardware security module]]s (HSM) or [[smart card]]s. ...
    5 KB (756 words) - 00:12, 26 March 2025
  • ...A (cryptosystem)|RSA]], [[elliptic curve cryptography]] and [[post-quantum cryptography]], and is used to investigate [[conjectures]] and [[open problems]] in numb | title = Algorithmic Number Theory: Lattices, Number Fields, Curves and Cryptography ...
    7 KB (803 words) - 00:17, 18 February 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)