Protecting against the quantum computing revolution
By Sky Sharma
High-dimensional grid structures
Cryptographic hash functions
Error-correcting codes
Polynomial equations
Elliptic curve isogenies