Post-quantum cryptography (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Post-quantum cryptography" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
5,032nd place
3,357th place
355th place
454th place
11th place
8th place
1st place
1st place
207th place
136th place
383rd place
320th place
69th place
59th place
low place
8,415th place
18th place
17th place
652nd place
515th place
5th place
5th place
low place
low place
153rd place
151st place
7,368th place
6,009th place
low place
low place
1,160th place
737th place
4th place
4th place
1,283rd place
1,130th place
low place
low place
low place
low place
low place
low place
low place
low place
214th place
176th place
102nd place
76th place
1,031st place
879th place
274th place
309th place
low place
low place
459th place
360th place
1,185th place
840th place
low place
low place
low place
low place
4,464th place
4,468th place
low place
low place
1,983rd place
1,330th place
low place
low place
low place
low place
low place
low place
low place
low place
1,272nd place
837th place
67th place
64th place
1,868th place
1,240th place
2,742nd place
1,754th place
low place
low place

9to5mac.com

acm.org

dl.acm.org

apple.com

security.apple.com

archives-ouvertes.fr

hal.archives-ouvertes.fr

arxiv.org

  • Shor, Peter W. (1997). "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer". SIAM Journal on Computing. 26 (5): 1484–1509. arXiv:quant-ph/9508027. Bibcode:1995quant.ph..8027S. doi:10.1137/S0097539795293172. S2CID 2337707.
  • Wang, Yongge (2016). "Quantum resistant random linear code based public key encryption scheme RLCE". Proceedings of Information Theory (ISIT). IEEE ISIT: 2519–2523. arXiv:1512.08454. Bibcode:2015arXiv151208454W.
  • Delfs, Christina; Galbraith (2013). "Computing isogenies between supersingular elliptic curves over F_p". arXiv:1310.7789 [math.NT].

bikesuite.org

bouncycastle.org

downloads.bouncycastle.org

doi.org

etsi.org

etsi.org

docbox.etsi.org

frodokem.org

github.com

googleblog.com

security.googleblog.com

handle.net

hdl.handle.net

harvard.edu

ui.adsabs.harvard.edu

  • Shor, Peter W. (1997). "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer". SIAM Journal on Computing. 26 (5): 1484–1509. arXiv:quant-ph/9508027. Bibcode:1995quant.ph..8027S. doi:10.1137/S0097539795293172. S2CID 2337707.
  • Wang, Yongge (2016). "Quantum resistant random linear code based public key encryption scheme RLCE". Proceedings of Information Theory (ISIT). IEEE ISIT: 2519–2523. arXiv:1512.08454. Bibcode:2015arXiv151208454W.

iacr.org

eprint.iacr.org

ieee.org

spectrum.ieee.org

ietf.org

tools.ietf.org

issikebrokenyet.github.io

macrumors.com

microsoft.com

nih.gov

pubmed.ncbi.nlm.nih.gov

nist.gov

csrc.nist.gov

nist.gov

nvlpubs.nist.gov

openquantumsafe.org

phys.org

pq-crystals.org

  • Schwabe, Peter. "Dilithium". pq-crystals.org. Retrieved 2023-08-19.

pqc-hqc.org

  • "HQC". pqc-hqc.org. Retrieved 2023-08-21.

pqcrypto.eu.org

pqcrypto.org

psu.edu

citeseerx.ist.psu.edu

qualys.com

community.qualys.com

rub.de

emsec.rub.de

science.org

securityinnovation.com

securityweek.com

semanticscholar.org

api.semanticscholar.org

  • Shor, Peter W. (1997). "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer". SIAM Journal on Computing. 26 (5): 1484–1509. arXiv:quant-ph/9508027. Bibcode:1995quant.ph..8027S. doi:10.1137/S0097539795293172. S2CID 2337707.
  • Kramer, Anna (2023). "'Surprising and super cool.' Quantum algorithm offers faster way to hack internet encryption". Science. 381 (6664): 1270. doi:10.1126/science.adk9443. PMID 37733849. S2CID 262084525.
  • Easttom, Chuck (2019-02-01). "An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives". 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC). pp. 0811–0818. doi:10.1109/CCWC.2019.8666459. ISBN 978-1-7281-0554-3. S2CID 77376310.
  • Ding, Jintai; Schmidt (7 June 2005). "Rainbow, a New Multivariable Polynomial Signature Scheme". In Ioannidis, John (ed.). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 3531. pp. 64–175. doi:10.1007/11496137_12. ISBN 978-3-540-26223-7. S2CID 6571152.
  • Castryck, Wouter; Lange, Tanja; Martindale, Chloe; Panny, Lorenz; Renes, Joost (2018). "CSIDH: An Efficient Post-Quantum Commutative Group Action". In Peyrin, Thomas; Galbraith, Steven (eds.). Advances in Cryptology – ASIACRYPT 2018. Lecture Notes in Computer Science. Vol. 11274. Cham: Springer International Publishing. pp. 395–427. doi:10.1007/978-3-030-03332-3_15. hdl:1854/LU-8619033. ISBN 978-3-030-03332-3. S2CID 44165584.
  • De Feo, Luca; Kohel, David; Leroux, Antonin; Petit, Christophe; Wesolowski, Benjamin (2020). "SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies" (PDF). In Moriai, Shiho; Wang, Huaxiong (eds.). Advances in Cryptology – ASIACRYPT 2020. Lecture Notes in Computer Science. Vol. 12491. Cham: Springer International Publishing. pp. 64–93. doi:10.1007/978-3-030-64837-4_3. ISBN 978-3-030-64837-4. S2CID 222265162.
  • Castryck, Wouter; Decru, Thomas (2023), Hazay, Carmit; Stam, Martijn (eds.), "An Efficient Key Recovery Attack on SIDH", Advances in Cryptology – EUROCRYPT 2023, vol. 14008, Cham: Springer Nature Switzerland, pp. 423–447, doi:10.1007/978-3-031-30589-4_15, ISBN 978-3-031-30588-7, S2CID 258240788, retrieved 2023-06-21
  • Nejatollahi, Hamid; Dutt, Nikil; Ray, Sandip; Regazzoni, Francesco; Banerjee, Indranil; Cammarota, Rosario (2019-02-27). "Post-Quantum Lattice-Based Cryptography Implementations: A Survey". ACM Computing Surveys. 51 (6): 1–41. doi:10.1145/3292548. ISSN 0360-0300. S2CID 59337649.
  • Misoczki, R.; Tillich, J. P.; Sendrier, N.; Barreto, P. S. L. M. (2013). "MDPC-McEliece: New McEliece variants from Moderate Density Parity-Check codes". 2013 IEEE International Symposium on Information Theory. pp. 2069–2073. CiteSeerX 10.1.1.259.9109. doi:10.1109/ISIT.2013.6620590. ISBN 978-1-4799-0446-4. S2CID 9485532.

sphincs.org

springer.com

link.springer.com

stackexchange.com

crypto.stackexchange.com

tau.ac.il

eng.tau.ac.il

ukri.org

uknqt.ukri.org

umich.edu

web.eecs.umich.edu

web.archive.org

worldcat.org

search.worldcat.org

yp.to

cr.yp.to

blog.cr.yp.to