Useful Links
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
Code-Based Cryptography
Mathematical Foundations
Linear Error-Correcting Codes
Code Parameters
Generator and Parity-Check Matrices
Syndrome Decoding
Decoding Problem Hardness
General Linear Code Decoding
NP-Completeness Results
Average-Case Hardness
Specific Code Families
Goppa Codes
Reed-Solomon Codes
LDPC Codes
Polar Codes
Cryptographic Constructions
McEliece Cryptosystem
Original Construction
Goppa Code Implementation
Security Analysis
Key Size Challenges
Niederreiter Cryptosystem
Dual Construction
Advantages over McEliece
Implementation Considerations
Code-Based Signatures
CFS Signatures
Wave Signatures
Security Properties
Modern Developments
Structured Codes
Quasi-Cyclic Codes
Key Size Reduction
Security Trade-offs
Rank-Based Cryptography
Rank Metric Codes
LRPC Codes
Security Analysis
Previous
9. Lattice-Based Cryptography
Go to top
Next
11. Hash-Based Cryptography