| Name | Last modified | Size | Description |
|
| Parent Directory | | - | |
| Post-Quantum Cryptography from Mutant Prime Knots (2010) - Marzuoli, Palumbo.pdf | 2023-08-25 22:25 | 137K | |
| A new one-time signature scheme from syndrome decoding (2007) - Barreto, Misoczki.pdf | 2023-08-25 22:25 | 195K | |
| Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attacks (1997) - Berson.pdf | 2023-08-25 22:25 | 217K | |
| Quantum Computation and Lattice Problems (2008) - Regev.pdf | 2023-08-25 22:25 | 275K | |
| Post-Quantum Cryptography for Long-Term Security (2015) - PQCRYPTO.pdf | 2023-08-25 22:25 | 275K | |
| Post-quantum Cryptography: Code-Based Signatures (2010) - Cayrel, Meziani.pdf | 2023-08-25 22:25 | 317K | |
| Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices (2015) - Heyse, von Maurich, Güneysu.pdf | 2023-08-25 22:25 | 347K | |
| McBits: Fast Constant-Time Code-Based Cryptography (2013) - Bernstein, Chou, Schwabe.pdf | 2023-08-25 22:25 | 395K | |
| A Quantum-Safe Circuit-Extension Handshake for Tor (2015) - Schanck, Whyte, Zhang.pdf | 2023-08-25 22:25 | 409K | |
| ARMed SPHINCS: Computing a 41KB signature in 16KB of RAM (2015) - Hülsing, Rijneveld, Schwabe.pdf | 2023-08-25 22:25 | 513K | |
| The Fiat-Shamir Transformation in a Quantum World (2013) - Dagdelen, Fischlin, Gagliardoni.pdf | 2023-08-25 22:25 | 584K | |
| Post-Quantum Key Exchange for the TLS Protocol from the Ring-LWE Problem (2015) - Bos, Costello, Naehrig, Stebila.pdf | 2023-08-25 22:25 | 586K | |
| XMSS: A Practical Forward-Secure Signature Scheme Based on Minimal Security Assumptions (2011) - Buchmann, Hülsing.pdf | 2023-08-25 22:25 | 593K | |
| SPHINCS: practical stateless hash-based signatures (2014) - Bernstein, Hopwood, Lange, Wilcox-OHearn, et. al.pdf | 2023-08-25 22:25 | 669K | |
| MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes (2012) - Misoczki, Tillich, Sendrier, Barreto.pdf | 2023-08-25 22:25 | 670K | |
| Post-Quantum Key Exchange: A New Hope (2015) - Alkim, Ducas, Pöppelmann, Schwabe.pdf | 2023-08-25 22:25 | 732K | |
| XMSS-T: Mitigating Multi-target Attacks in Hash-based Signatures (2016) - Hülsing, Rijneveld, Song.pdf | 2023-08-25 22:25 | 876K | |
| Post-Quantum Cryptography: 4th International Workshop Proceedings (2011).pdf | 2023-08-25 22:25 | 4.7M | |
| Post-Quantum Cryptography (2009) - Bernstein, Buchmann, Dahmen.pdf | 2023-08-25 22:25 | 5.7M | |
| Post-Quantum Cryptography: 6th International Workshop Proceedings (2014).pdf | 2023-08-25 22:25 | 5.8M | |
| Post-Quantum Cryptography: 3rd International Workshop Proceedings (2010).pdf | 2023-08-25 22:25 | 6.0M | |
|