Resources

Learn

Curated learning materials for understanding post-quantum cryptography. From official NIST standards to beginner-friendly explanations.

NIST Standards

Learning Materials

Getting Started

Lattice Cryptography

Hash-Based Signatures

Quantum Computing Background

Implementation & Libraries

Glossary

KEM
Key Encapsulation Mechanism — a method for two parties to establish a shared secret key.
LWE
Learning With Errors — a hard mathematical problem involving noisy linear equations over lattices.
MLWE
Module Learning With Errors — a structured variant of LWE using polynomial modules for efficiency.
Polynomial Ring
An algebraic structure R_q = Z_q[X]/(X^n + 1) where computations happen on polynomials modulo X^n + 1.
Lattice
A regular grid of points in high-dimensional space. Finding short vectors in large lattices is believed to be hard even for quantum computers.
Merkle Tree
A binary tree of hash values where each parent is the hash of its children. The root acts as a fingerprint for all leaves.
WOTS+
Winternitz One-Time Signature Plus — a hash-based signature scheme that can only be used once safely.
Rejection Sampling
A technique where the signer discards outputs that would leak information about the secret key.
Fiat-Shamir Transform
A technique to convert an interactive proof into a non-interactive signature by replacing the verifier with a hash function.
Grover's Algorithm
A quantum algorithm that searches unsorted data in O(sqrt(N)) time — provides a quadratic (not exponential) speedup.
Shor's Algorithm
A quantum algorithm that breaks RSA and ECC by efficiently factoring large numbers and computing discrete logarithms.
Authentication Path
The set of sibling hashes needed to recompute a Merkle tree root from a single leaf — proof of membership.

Ready to see these concepts in action?