Chapter 15

Other Approaches to Quantum Resistant Cryptography

Chapter Objectives

After reading this chapter and completing the review questions, you will be able to do the following:

  • Understand the basis for hash-based cryptographic algorithms

  • Demonstrate a working knowledge of code-based cryptography

  • Explain the concepts of supersingular isogeny key exchange

  • Comprehend the details of a few exemplary algorithms

Chapter 13, “Lattice-based Cryptography,” and Chapter 14, “Multivariate Cryptography,” introduced you to various types of cryptographic algorithms that have been posited as quantum resistant. This chapter presents you with an assortment of cryptographic algorithms that do not fit neatly into one of those two categories.

15.1 Hash Functions ...

Get Quantum Computing Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.