• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
String-Matching Problem
String-Matching Problem

Split-Ordered Lists: Lock-Free Extensible Hash Tables
Split-Ordered Lists: Lock-Free Extensible Hash Tables

Practice Questions with Solutions
Practice Questions with Solutions

Voice Over IP and Security
Voice Over IP and Security

What is Security?
What is Security?

Efficient quantum algorithms for some instances of the non
Efficient quantum algorithms for some instances of the non

An IPSec-based Host Architecture for Secure
An IPSec-based Host Architecture for Secure

1 What is the Subset Sum Problem? 2 An Exact Algorithm for the
1 What is the Subset Sum Problem? 2 An Exact Algorithm for the

security threats: a guide for small and medium
security threats: a guide for small and medium

U.C. Berkeley — CS270: Algorithms Lectures 13, 14 Scribe: Anupam
U.C. Berkeley — CS270: Algorithms Lectures 13, 14 Scribe: Anupam

Lecture1
Lecture1

Network Security: an Economic Perspective
Network Security: an Economic Perspective

SetNo11
SetNo11

View File - University of Engineering and Technology, Taxila
View File - University of Engineering and Technology, Taxila

Document
Document

Extended Hidden Number Problem and Its
Extended Hidden Number Problem and Its

Data Encryption Standard - gozips.uakron.edu
Data Encryption Standard - gozips.uakron.edu

Network security policy: best practices
Network security policy: best practices

10.2 BASIC E-COMMERCE SECURITY ISSUES AND LANDSCAPE
10.2 BASIC E-COMMERCE SECURITY ISSUES AND LANDSCAPE

Lecture 2 - Rabie A. Ramadan
Lecture 2 - Rabie A. Ramadan

Document
Document

II.I Selected Database Issues: 1
II.I Selected Database Issues: 1

... Message digest algorithms ‘Message digest algorithm’ or ‘one-way hash function’ : takes arbitrary sized string (message) and generates a fixed length string (the digest or hash). A digest has the following characteristics: ...
Computer and Information Security
Computer and Information Security

COS 338_day17
COS 338_day17

Rimini Street Technology Solution Brief-Oracle Security-LT
Rimini Street Technology Solution Brief-Oracle Security-LT

< 1 ... 10 11 12 13 14 15 16 17 18 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report