Useful Links
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
  1. Computer Science
  2. Cybersecurity

Quantum Cryptography and Post-Quantum Cryptography

1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
  1. Isogeny-Based Cryptography
    1. Mathematical Foundations
      1. Elliptic Curves over Finite Fields
        1. Isogenies Definition and Properties
          1. Supersingular Elliptic Curves
            1. Isogeny Graphs
            2. Key Exchange Protocols
              1. Supersingular Isogeny Diffie-Hellman
                1. Protocol Description
                  1. Security Assumptions
                    1. Implementation Challenges
                    2. CSIDH Protocol
                      1. Class Group Actions
                        1. Efficiency Improvements
                          1. Security Analysis
                        2. Signature Schemes
                          1. CSI-FiSh Signatures
                            1. SQISign Protocol
                              1. Security Properties
                              2. Recent Developments
                                1. Cryptanalytic Advances
                                  1. SIDH Vulnerabilities
                                    1. Future Prospects

                                  Previous

                                  12. Multivariate Cryptography

                                  Go to top

                                  Next

                                  14. NIST Post-Quantum Cryptography Standardization

                                  © 2025 Useful Links. All rights reserved.

                                  About•Bluesky•X.com