Quick access
 
Contributions for Meeting CYBERQSC#2
  (View query details here)    Show filter options
  
Refresh Export to...
Default View
To apply filters, please click on Refresh
Drag a column header and drop it here to group by that column
Data pager
Data pager
1
Items per page
PageSizeComboBox
select
Page 1 of 1, rows 1 to 17 of 17
 UidTitleStatusSourceType
  
select
select
Data pager
Data pager
1
Items per page
PageSizeComboBox
select
Page 1 of 1, rows 1 to 17 of 17
 CYBERQSC(17)002010Intro to Primal and Dual Attacks on LWE-based Encryption SchemesAvailableRoyal HollowayOther
 CYBERQSC(17)002009Quantum-Safe (Multivariate) Signature -- UpdateAvailableINRIAOther
 CYBERQSC(17)002008Summary of latest changes to ETSI DirectivesAvailableETSIOther
 CYBERQSC(17)002007r2Optimize polynomial multiplication for NTRUEncryptAvailableSecurity Innovation, IncOther
 CYBERQSC(17)002007r1Optimize polynomial multiplication for NTRUEncryptRevisedSecurity Innovation, IncOther
 CYBERQSC(17)002007Optimize polynomial multiplication for NTRUEncryptRevisedSecurity Innovation, IncOther
 CYBERQSC(17)002006Draft DTR/CYBER-QSC-007 v0.0.2 "QSC-KEX"NotedNCSCDraft
 CYBERQSC(17)002005Identity-based quantum-safe cryptographyAvailableNCSCOther
 CYBERQSC(17)002004Quantum Safe Hybrid PKIAvailableISARAOther
 CYBERQSC(17)002003VPN WI DraftNotedISARADraft
 CYBERQSC(17)002002Report from QSC#2AcceptedApproach InfinityReport
 CYBERQSC(17)002001r3Cyber QSC#2 agenda Rev 3AvailableApproach InfinityAgenda
 CYBERQSC(17)002001r2Cyber QSC#2 agenda Rev 2RevisedApproach InfinityAgenda
 CYBERQSC(17)002001r1Cyber QSC#2 agenda Rev 1RevisedApproach InfinityAgenda
 CYBERQSC(17)002001Cyber QSC#2 agendaRevisedApproach InfinityAgenda
 CYBERQSC(17)000003a1Draft extended roadmapAvailableISARAOther
 CYBERQSC(17)000003QSC Extended RoadmapAcceptedISARANWI