bindex

PQC_for_Dummies

Index A authentication 16, 21, 30, 43, 44, 49, 51 C Code-based Cryptography 26 D Diffie-Hellman protocol (DH) 26 E eIDAS 23 elliptic-curve cryptography 36, 42 G Goppa codes 27, 28, 37 Grover’s algorithm 13, 15, 31, 34, 42 H hardware security module (HSM) 47 Hash-based cryptography 25 HSM simulators 52 hybrid 21, 41, 42, 50 I Implementation 19, 21 implementation of post-quantum schemes 21 K Key-exchange schemes 38 L Lattice-based cryptography 25 M McEliece scheme 27 Multivariate Cryptography 32 N NewHope 21, 30, 38, 40, 42, 50 NTRUEncrypt 29, 30, 40 NTRUSign 30, 40 Q quantum computer 14–16, 17, 20, 30, 36, 40 S Shor’s algorithm 13, 16, 17 software development kit (SDK) 49, 51 T Trusted Platform Modules (TPMs) 48 U Utimaco 50–52


PQC_for_Dummies
To see the actual publication please follow the link above