A robust family of quantum-resistant cryptographic algorithms based on the assumed computational complexity of solving systems of nonlinear multivariable equations over a finite field.
Among the features of this class of algorithms short public and secret keys can be distinguished as well as conservatism from the security point of view.
Secure multiparty computation protocols enable data scientists and analysts to collectively, securely and confidentially compute on distributed data without ever exposing or moving it.
A type of data encryption that allows for computations to be done on encrypted data so that the decryption result is identical to the result of operations performed on the unencrypted data.
A type of public key-encryption in which the user's secret key and the ciphertext are dependent upon certain attributes. In such a system, the decryption of a ciphertext is only possible if the set of attributes of the user key matches the attributes of the ciphertext.
A competition organized by the US National Institute of Standards and Technology to standardize a set of quantum-resistant cryptographic key encapsulation and digital signature schemes.
A competition organized by the Chinese Association for Cryptologic Research to select the most promising post-quantum cryptographic algorithms in 2018-2019.