Useful Links
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
  1. Computer Science
  2. Cybersecurity

Quantum Cryptography and Post-Quantum Cryptography

1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
  1. Advanced Quantum Cryptographic Protocols
    1. Device-Independent QKD
      1. Motivation and Principles
        1. Bell Test Requirements
          1. Loophole-Free Bell Tests
            1. Security Analysis
            2. Measurement-Device-Independent QKD
              1. Protocol Description
                1. Security Advantages
                  1. Implementation Requirements
                  2. Quantum Digital Signatures
                    1. Principles and Protocols
                      1. Unforgeable Quantum Signatures
                        1. Non-Repudiation Properties
                          1. Implementation Challenges
                          2. Quantum Secret Sharing
                            1. Threshold Secret Sharing
                              1. Quantum Access Structures
                                1. Verifiable Secret Sharing
                                2. Quantum Coin Flipping
                                  1. Protocol Description
                                    1. Cheating Strategies
                                      1. Optimal Protocols
                                      2. Quantum Oblivious Transfer
                                        1. Protocol Variants
                                          1. Security Properties
                                            1. Impossibility Results

                                          Previous

                                          6. QKD Security Analysis

                                          Go to top

                                          Next

                                          8. Post-Quantum Cryptography Foundations

                                          © 2025 Useful Links. All rights reserved.

                                          About•Bluesky•X.com