Knowledge Base of quantum threats and quantum resistant algorithms
Cryptography
Cryptography is a branch of mathematics that studies methods of protecting information through mathematical transformations.
Learn more
Quantum computers are a new generation of computing devices based on the effects of quantum physics.
Learn more
A risk associated with an adversary gaining access to data encrypted using traditional methods as a result of a quantum computer-based cyberattack.
Learn more
New cryptographic algorithms resistant to quantum computer-based attacks.
Learn more
A family of asymmetric cryptographic algorithms, robust against classical and quantum computer attacks.
Learn more
A quantum algorithm for integer factorization.
Learn more
A quantum algorithm for unstructured search.
Learn more
Cryptographic algorithms from this family are relatively slow and yet able to provide short public keys and ciphertexts.
Learn more
A robust family of quantum-resistant cryptographic algorithms based on the assumed computational complexity of solving systems of nonlinear multivariable equations over a finite field.
Learn more
Cryptographic algorithms from this family are relatively efficient, but generate large keys.
Learn more
Cryptographic algorithms from this family are relatively efficient and generate medium-length keys.
Learn more
Among the features of this class of algorithms short public and secret keys can be distinguished as well as conservatism from the security point of view.
Learn more
Secure multiparty computation protocols enable data scientists and analysts to collectively, securely and confidentially compute on distributed data without ever exposing or moving it.
Learn more
A type of data encryption that allows for computations to be done on encrypted data so that the decryption result is identical to the result of operations performed on the unencrypted data.
Learn more
A type of public key-encryption in which the user's secret key and the ciphertext are dependent upon certain attributes. In such a system, the decryption of a ciphertext is only possible if the set of attributes of the user key matches the attributes of the ciphertext.
Learn more
An attack in which an adversary attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms.
Learn more
A competition organized by the US National Institute of Standards and Technology to standardize a set of quantum-resistant cryptographic key encapsulation and digital signature schemes.
Learn more
A competition organized by the Chinese Association for Cryptologic Research to select the most promising post-quantum cryptographic algorithms in 2018-2019.
Learn more