UsefulLinks
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
11.
Hash-Based Cryptography
11.1.
Theoretical Foundations
11.1.1.
One-Way Functions
11.1.2.
Hash Function Security Properties
11.1.3.
Merkle Tree Structures
11.1.4.
Security Reductions
11.2.
One-Time Signatures
11.2.1.
Lamport Signatures
11.2.1.1.
Construction and Security
11.2.1.2.
Key and Signature Sizes
11.2.1.3.
Implementation Details
11.2.2.
Winternitz Signatures
11.2.2.1.
Parameter Trade-offs
11.2.2.2.
Security Analysis
11.2.2.3.
Optimization Techniques
11.3.
Few-Time Signatures
11.3.1.
HORS Signatures
11.3.2.
Security Degradation
11.3.3.
Parameter Selection
11.4.
Many-Time Signatures
11.4.1.
Merkle Signature Scheme
11.4.1.1.
Tree-Based Construction
11.4.1.2.
State Management
11.4.1.3.
Security Properties
11.4.2.
XMSS
11.4.2.1.
Stateful Design
11.4.2.2.
Forward Security
11.4.2.3.
Implementation Standards
11.4.3.
SPHINCS+
11.4.3.1.
Stateless Construction
11.4.3.2.
FORS and WOTS+ Integration
11.4.3.3.
NIST Standardization
11.4.3.4.
Performance Analysis
Previous
10. Code-Based Cryptography
Go to top
Next
12. Multivariate Cryptography