About 523,000 results
Open links in new tab
  1. PQCrypto - Introduction

    The book has a 2009 publication date but was already available in November 2008 from booksellers such as Amazon. For earlier analyses of the impact of quantum computers on cryptography, see the …

  2. Post-Quantum Cryptography (PQCrypto) - dblp

    Dec 2, 2025 · Post-Quantum Cryptography - 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15578, Springer …

  3. International Conference on Post-Quantum Cryptography

    Explore groundbreaking research and insights presented in conference proceedings published with Springer Nature.

  4. Post-Quantum Cryptography | CSRC

    Jan 3, 2017 · NIST’s Post-Quantum Cryptography (PQC) project leads the national and global effort to secure electronic information against the future threat of quantum computers—machines that may be …

  5. PQCRYPTO ICT-645622

    Practical, Quantum-Secure Key Exchange from LWE Conference on Computer and Communications Security (ACM CCS) 2016. ePrint preprint Peter Schwabe and Ko Stoffelen.

  6. Post-Quantum Cryptography (PQCrypto) - Conference proceedings

    Post-Quantum Cryptography PQCrypto.

  7. Conferences - PQCrypto

    Apr 11, 2019 · PQCrypto 2006 did not have official proceedings but almost all of the accepted papers are available on the conference site. Subsequent PQCrypto events have had official proceedings …

  8. PQCrypto 2025 Accepted Papers

    The proceedings of PQCrypto 2025 have appeared at Springer as Post-Quantum Cryptography Part I and Post-Quantum Cryptography Part II. Preparing the list of papers.

  9. POST-QUANTUM CRYPTOGRAPHY : 10TH INTERNATIONAL CONFERENCE, PQCRYPTO 2019, CHONGQING, CHINA, MAY 8-10, 2019 REVISED SELECTED PAPERS PDF, EPUB, EBOOK

  10. Post-Quantum Cryptography: 10th International Conference, PQCrypto

    This International Workshop, PQCrypto 2019, focus on cryptosystems that have the potential to be safe against quantum computers, implementations of, and side-channel attacks on, post-quantum …