Useful Links
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
Hash-Based Cryptography
Theoretical Foundations
One-Way Functions
Hash Function Security Properties
Merkle Tree Structures
Security Reductions
One-Time Signatures
Lamport Signatures
Construction and Security
Key and Signature Sizes
Implementation Details
Winternitz Signatures
Parameter Trade-offs
Security Analysis
Optimization Techniques
Few-Time Signatures
HORS Signatures
Security Degradation
Parameter Selection
Many-Time Signatures
Merkle Signature Scheme
Tree-Based Construction
State Management
Security Properties
XMSS
Stateful Design
Forward Security
Implementation Standards
SPHINCS+
Stateless Construction
FORS and WOTS+ Integration
NIST Standardization
Performance Analysis
Previous
10. Code-Based Cryptography
Go to top
Next
12. Multivariate Cryptography