• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
National Initiative For Cybersecurity Education (NICE)
National Initiative For Cybersecurity Education (NICE)

OSI Security Architecture
OSI Security Architecture

Chapter 2: Fundamentals of the Analysis of Algorithm Efficiency
Chapter 2: Fundamentals of the Analysis of Algorithm Efficiency

Slides  - My E-town
Slides - My E-town

Numerical Methods for Semiconductor Hetrostructures with Band
Numerical Methods for Semiconductor Hetrostructures with Band

Chapter 1
Chapter 1

Chapter 1
Chapter 1

Algorithms Lecture 5 Name:___________________________
Algorithms Lecture 5 Name:___________________________

RVC LOGO - Jobs at RVC
RVC LOGO - Jobs at RVC

Emerging Threats to Business Security
Emerging Threats to Business Security

Support: Ticket, Process, and Expectations
Support: Ticket, Process, and Expectations

Ontology of Quantum Space interpreted by Quantum Real Numbers.
Ontology of Quantum Space interpreted by Quantum Real Numbers.

Advanced Linux Security
Advanced Linux Security

SPAA: Symposium on Parallelism in Algorithms and Architectures
SPAA: Symposium on Parallelism in Algorithms and Architectures

Implementation of Multiple Constant Multiplication
Implementation of Multiple Constant Multiplication

The Full Quantum Mechanical Three Body Problem of H2 (Non
The Full Quantum Mechanical Three Body Problem of H2 (Non

Cryptanalysis of Shieh-Lin-Yang
Cryptanalysis of Shieh-Lin-Yang

What Are Quantum States? S. Malin Dept. of Physics and Astronomy
What Are Quantum States? S. Malin Dept. of Physics and Astronomy

Document
Document

03-WAS Common Threats - Professional Data Management
03-WAS Common Threats - Professional Data Management

Decrease-and
Decrease-and

CADD LEGACY PCA Model 6300
CADD LEGACY PCA Model 6300

Cryptographic hashing - comp
Cryptographic hashing - comp

Web Application Security Vulnerabilities Yen
Web Application Security Vulnerabilities Yen

The Learnability of Quantum States
The Learnability of Quantum States

< 1 ... 11 12 13 14 15 16 17 18 19 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report