Useful Links
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
Advanced Quantum Cryptographic Protocols
Device-Independent QKD
Motivation and Principles
Bell Test Requirements
Loophole-Free Bell Tests
Security Analysis
Measurement-Device-Independent QKD
Protocol Description
Security Advantages
Implementation Requirements
Quantum Digital Signatures
Principles and Protocols
Unforgeable Quantum Signatures
Non-Repudiation Properties
Implementation Challenges
Quantum Secret Sharing
Threshold Secret Sharing
Quantum Access Structures
Verifiable Secret Sharing
Quantum Coin Flipping
Protocol Description
Cheating Strategies
Optimal Protocols
Quantum Oblivious Transfer
Protocol Variants
Security Properties
Impossibility Results
Previous
6. QKD Security Analysis
Go to top
Next
8. Post-Quantum Cryptography Foundations