• Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was...
    37 KB (2,770 words) - 14:52, 14 August 2024
  • Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms...
    62 KB (6,467 words) - 14:01, 8 November 2024
  • Technology (NIST), specified that algorithms in its post-quantum cryptography competition support a minimum of 264 signatures safely. In 2022, NIST announced...
    20 KB (2,329 words) - 09:31, 3 September 2024
  • Kyber (category Lattice-based cryptography)
    Third Round of the NIST Post-Quantum Cryptography Standardization Process (PDF), Gaithersburg, MD, pp. NIST IR 8413, doi:10.6028/nist.ir.8413,...
    14 KB (1,416 words) - 19:09, 20 October 2024
  • solved efficiently. In 2024 NIST announced the Module-Lattice-Based Digital Signature Standard for post-quantum cryptography. In 1996, Miklós Ajtai introduced...
    23 KB (2,793 words) - 23:26, 17 September 2024
  • Victor S. Miller in 1985. Elliptic curve cryptography algorithms entered wide use in 2004 to 2005. In 1999, NIST recommended fifteen elliptic curves. Specifically...
    39 KB (4,674 words) - 13:00, 24 September 2024
  • NTRU (redirect from HRSS (cryptography))
    round of NIST's Post-Quantum Cryptography Standardization project, whereas NTRU Prime became an alternate candidate. At equivalent cryptographic strength...
    12 KB (1,213 words) - 11:11, 15 August 2024
  • NewHope (category Post-quantum cryptography)
    contestant in the NIST Post-Quantum Cryptography Standardization competition, and was used in Google's CECPQ1 experiment as a quantum-secure algorithm...
    4 KB (409 words) - 14:18, 28 August 2023
  • McEliece cryptosystem (category Post-quantum cryptography)
    has never gained much acceptance in the cryptographic community, but is a candidate for "post-quantum cryptography", as it is immune to attacks using Shor's...
    16 KB (2,089 words) - 08:29, 14 August 2024
  • Thumbnail for Daniel J. Bernstein
    was one of four algorithms selected as winners of the NIST Post-Quantum Cryptography Standardization competition. It was the only hash-based algorithm of...
    21 KB (1,904 words) - 06:03, 31 August 2024
  • Falcon (signature scheme) (category Cryptography stubs)
    verifications per second.[11] Post-quantum cryptography Lattice-based cryptography NTRU NIST Post-Quantum Cryptography Standardization 1.^ Thomas Prest; Pierre-Alain...
    4 KB (388 words) - 19:19, 21 April 2024
  • NTRUSign (category Post-quantum cryptography)
    A redesigned pqNTRUSign had been submitted to the NIST Post-Quantum Cryptography Standardization competition. It is based on "hash-and-sign" (contrasting...
    6 KB (628 words) - 20:29, 28 December 2022
  • In cryptography, a salt is random data fed as an additional input to a one-way function that hashes data, a password or passphrase. Salting helps defend...
    13 KB (1,533 words) - 23:19, 23 October 2024
  • keylength calculator Articles discussing the implications of quantum computing NIST cryptographic toolkit Burt Kaliski: TWIRL and RSA key sizes (May 2003)...
    29 KB (3,213 words) - 18:15, 18 September 2024
  • Thumbnail for Cryptographic hash function
    execution, NIST recommends an iteration count of 10,000 or more.: 5.1.1.2  Avalanche effect Comparison of cryptographic hash functions Cryptographic agility...
    48 KB (6,237 words) - 00:38, 5 November 2024
  • potential candidate for standardization, however it was not submitted to NIST. NIST's criteria for selecting schemes to standardize includes side-channel...
    4 KB (461 words) - 00:40, 15 October 2024
  • 8, 2023. Retrieved October 19, 2023. "NIST Releases First 3 Finalized Post-Quantum Encryption Standards". NIST. August 13, 2024. "2012 Plum Book". Government...
    49 KB (4,797 words) - 02:11, 8 November 2024
  • Server. He is a submitter of the Frodo post-quantum proposal to the NIST Post-Quantum Cryptography Standardization project. His leadership has also been...
    5 KB (474 words) - 06:45, 29 July 2024
  • the performance implications, the NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface...
    29 KB (3,627 words) - 07:56, 1 October 2024
  • Ring learning with errors key exchange (category Post-quantum cryptography)
    n = 1024 parameters of Singh, and was submitted to NIST's Post-Quantum Cryptography Standardization project under the name NewHope. Also in their November...
    23 KB (3,424 words) - 23:09, 30 August 2024
  • multivariate cryptography signature schemes (GeMMS, LUOV, Rainbow and MQDSS) have made their way into the 2nd round of the NIST post-quantum competition:...
    8 KB (1,145 words) - 10:46, 3 September 2024
  • Competition to design authenticated encryption schemes Post-Quantum Cryptography Standardization "Federal Register / Vol. 72, No. 212" (PDF). Federal Register...
    27 KB (2,244 words) - 20:34, 28 February 2024
  • increases the time taken to attack the password hashes. Salt (cryptography) HMAC passwd "NIST Special Publication 800-63B". 2022-12-16. Section 5.1.1.2....
    8 KB (1,045 words) - 20:49, 6 November 2024
  • Elliptic Curve Digital Signature Algorithm (category Public-key cryptography)
    for elliptic-curve cryptography". October 25, 2013. Bernstein, Daniel J.; Lange, Tanja (May 31, 2013). "Security dangers of the NIST curves" (PDF). Schneier...
    19 KB (2,833 words) - 03:20, 18 September 2024
  • Thumbnail for Advanced Encryption Standard
    Advanced Encryption Standard (category Cryptography)
    announced by the NIST as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001. This announcement followed a five-year standardization process in which fifteen...
    49 KB (5,566 words) - 22:30, 30 October 2024
  • Thumbnail for Symmetric-key algorithm
    symmetric-key algorithms appear to be resistant to the threat of post-quantum cryptography. Quantum computers would exponentially increase the speed at which...
    15 KB (1,544 words) - 20:48, 3 November 2024
  • SHA-3 (category NIST hash function competition)
    successful attacks on MD5, SHA-0 and SHA-1, NIST perceived a need for an alternative, dissimilar cryptographic hash, which became SHA-3. After a setup period...
    52 KB (5,712 words) - 05:04, 9 October 2024
  • Thumbnail for Cryptography
    exchange, RSA (Rivest–Shamir–Adleman), ECC (Elliptic Curve Cryptography), and Post-quantum cryptography. Secure symmetric algorithms include the commonly used...
    100 KB (10,952 words) - 00:57, 9 November 2024
  • the performance implications, the NIST recommends an "extended AES-CTR-DRBG interface" for its Post-Quantum Cryptography Project submissions. This interface...
    17 KB (1,979 words) - 19:45, 1 April 2024
  • In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating...
    16 KB (1,914 words) - 13:54, 20 October 2024