Contains the archived source code related to my PhD thesis titled "Polynomial Multiplication for Post-Quantum Cryptography". See https://kannwischer.eu Alternatively, you can get the code directly from upstream: https://github.com/mkannwischer/polymul https://github.com/mupq/polymul-z2mx-m4 https://github.com/mupq/nttm4 https://github.com/dilithium-cortexm/dilithium-cortexm https://github.com/ntt-polymul/ntt-polymu
The security of public-key cryptography depends on the computational intractability of some hard pro...
Cryptography is essential for the security of online communication, cars and implanted medical devic...
Cryptography is essential for the security of online communication, cars and implanted medical devic...
Contains the archived source code related to my PhD thesis titled "Polynomial Multiplication for Pos...
Item does not contain fulltextContains the archived source code related to my PhD thesis titled "Pol...
With the advance of quantum computers, there is an urgent need to find replacements for public-key c...
One of the main practical implications of quantum mechanical theory is quantum computing, and theref...
Cryptography has been used from time immemorial for preserving the confidentiality of data/informati...
Widely used public key cryptography is threatened by the development of quantum computers. Post-quan...
Widely used public key cryptography is threatened by the development of quantum computers. Post-quan...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
The security of public-key cryptography depends on the computational intractability of some hard pro...
Cryptography is essential for the security of online communication, cars and implanted medical devic...
Cryptography is essential for the security of online communication, cars and implanted medical devic...
Contains the archived source code related to my PhD thesis titled "Polynomial Multiplication for Pos...
Item does not contain fulltextContains the archived source code related to my PhD thesis titled "Pol...
With the advance of quantum computers, there is an urgent need to find replacements for public-key c...
One of the main practical implications of quantum mechanical theory is quantum computing, and theref...
Cryptography has been used from time immemorial for preserving the confidentiality of data/informati...
Widely used public key cryptography is threatened by the development of quantum computers. Post-quan...
Widely used public key cryptography is threatened by the development of quantum computers. Post-quan...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
Post-quantum cryptosystems have currently seen a surge in interest thanks to the current standardiza...
The security of public-key cryptography depends on the computational intractability of some hard pro...
Cryptography is essential for the security of online communication, cars and implanted medical devic...
Cryptography is essential for the security of online communication, cars and implanted medical devic...