• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Mainline How Secure Are You K12 Security Preseo Rev 1
Mainline How Secure Are You K12 Security Preseo Rev 1

CSIT560 Project Presentation
CSIT560 Project Presentation

Issue 43 Key RSC Discussion
Issue 43 Key RSC Discussion

The Analytical Study of Electronic and Optical Properties of Pyramid
The Analytical Study of Electronic and Optical Properties of Pyramid

CSC 482/582: Computer Security
CSC 482/582: Computer Security

Streaming Algorithms - Computer Science, Stony Brook University
Streaming Algorithms - Computer Science, Stony Brook University

Shor`s Algorithm for Factorizing Large Integers
Shor`s Algorithm for Factorizing Large Integers

Public-key encryption
Public-key encryption

1 - Images
1 - Images

Auditing (cont'd.) - Elgin Community College
Auditing (cont'd.) - Elgin Community College

Introduction to Information Security Chapter N
Introduction to Information Security Chapter N

abidah
abidah

Sentinel SuperPro™
Sentinel SuperPro™

IP Traceback With Deterministic Packet Marking
IP Traceback With Deterministic Packet Marking

Green-Aware Security
Green-Aware Security

hw1_sol
hw1_sol

Huntsman Security updates trail-blazing cyber security analytics and
Huntsman Security updates trail-blazing cyber security analytics and

information Security Blueprint
information Security Blueprint

Solving Linear Systems: Iterative Methods and Sparse Systems COS 323
Solving Linear Systems: Iterative Methods and Sparse Systems COS 323

Succinct Data Structure
Succinct Data Structure

Hamiltonian identification for quantum systems
Hamiltonian identification for quantum systems

Grid Programming (1)
Grid Programming (1)

Flowers - Rose
Flowers - Rose

Computer Information Systems (Forensics Classes) Objectives for
Computer Information Systems (Forensics Classes) Objectives for

Analysis of Algorithms Background Asymptotic Analysis Worst
Analysis of Algorithms Background Asymptotic Analysis Worst

< 1 ... 6 7 8 9 10 11 12 13 14 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report