• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Analysis of Algorithms Background Asymptotic Analysis Worst
Analysis of Algorithms Background Asymptotic Analysis Worst

lecture1212
lecture1212

Design and Implementation of Security Operating System based on
Design and Implementation of Security Operating System based on

evesecuref5
evesecuref5

LimTiekYeeMFKE2013ABS
LimTiekYeeMFKE2013ABS

Practical Network Support for IP Traceback
Practical Network Support for IP Traceback

Security policy design with IPSec
Security policy design with IPSec

Sample Bench Strength Summary - McGraw
Sample Bench Strength Summary - McGraw

Cell Probe Lower Bounds for Succinct Data Structures
Cell Probe Lower Bounds for Succinct Data Structures

Hashing
Hashing

Chapter 1
Chapter 1

HUNTING-AS-A-SERVICE By Accenture, Powered by Endgame
HUNTING-AS-A-SERVICE By Accenture, Powered by Endgame

20140529 马来西亚MY-12LS508A 说明书(英文+中文)转曲.cdr
20140529 马来西亚MY-12LS508A 说明书(英文+中文)转曲.cdr

Dictionary ADT Dictionary ADTs
Dictionary ADT Dictionary ADTs

This work by the National Information Security and Geospatial
This work by the National Information Security and Geospatial

Chapter 10
Chapter 10

Chapter 6: Sample Questions, Problems and Solutions Örnek Sorular (Sample Questions):
Chapter 6: Sample Questions, Problems and Solutions Örnek Sorular (Sample Questions):

Summary of big ideas
Summary of big ideas

LEARNING: STUDY GUIDE TEST 1
LEARNING: STUDY GUIDE TEST 1

Security Analysis of a Single Sign
Security Analysis of a Single Sign

solution - cse.sc.edu
solution - cse.sc.edu

Global Information Assurance Certification (GIAC) develops and administers the premier
Global Information Assurance Certification (GIAC) develops and administers the premier

ppt 2
ppt 2

No Slide Title - ECE Users Pages - Georgia Institute of Technology
No Slide Title - ECE Users Pages - Georgia Institute of Technology

Dependable Cyber Physical Systems
Dependable Cyber Physical Systems

< 1 ... 7 8 9 10 11 12 13 14 15 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report