Chapter 15
Other Approaches to Quantum Resistant Cryptography
Chapter Objectives
After reading this chapter and completing the review questions, you will be able to do the following:
Understand the basis for hash-based cryptographic algorithms
Demonstrate a working knowledge of code-based cryptography
Explain the concepts of supersingular isogeny key exchange
Comprehend the details of a few exemplary algorithms
Chapter 13, “Lattice-based Cryptography,” and Chapter 14, “Multivariate Cryptography,” introduced you to various types of cryptographic algorithms that have been posited as quantum resistant. This chapter presents you with an assortment of cryptographic algorithms that do not fit neatly into one of those two categories.
15.1 Hash Functions ...
Get Quantum Computing Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.