Useful Links
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
Lattice-Based Cryptography
Mathematical Foundations
Lattice Theory Basics
Lattice Definition
Basis and Fundamental Region
Lattice Problems
Shortest Vector Problem
Problem Definition
Computational Hardness
Approximation Variants
Closest Vector Problem
Problem Definition
Relationship to SVP
Hardness Results
Learning with Errors Problem
Problem Definition
Hardness Assumptions
Variants and Generalizations
Ring Learning with Errors
Polynomial Ring Structure
Efficiency Advantages
Security Considerations
Module Learning with Errors
Generalization of LWE and Ring-LWE
Security and Efficiency Trade-offs
Cryptographic Constructions
Public-Key Encryption
LWE-Based Encryption
Ring-LWE-Based Encryption
Security Analysis
Key Exchange Mechanisms
Lattice-Based Key Agreement
Error Reconciliation
Security Proofs
Digital Signatures
Hash-and-Sign Approaches
Fiat-Shamir Signatures
Rejection Sampling Techniques
Specific Algorithms
NTRU
Algorithm Description
Parameter Selection
Security Analysis
Implementation Considerations
Kyber
Key Encapsulation Mechanism
Module-LWE Foundation
NIST Standardization
Performance Characteristics
Dilithium
Signature Scheme Design
Module-LWE Security
Implementation Features
Standardization Status
Previous
8. Post-Quantum Cryptography Foundations
Go to top
Next
10. Code-Based Cryptography