SABER: Learning with Rounding … For Post-Quantum Crypto, It’s All About Lattice

--

NIST is now finalising the post-quantum cryptography competition. Overall the methods we can use to replace our existing public key methods are:

  • Hash-based/symmetric-based. This includes Merkle signatures, SPHINCS and Picnic, and are used to create digital signatures. They cannot be used for public-key encryption and involve…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.