• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Systeemanalyse in Ontwerpprojecten
Systeemanalyse in Ontwerpprojecten

Designing Trusted Operating Systems Operating Systems
Designing Trusted Operating Systems Operating Systems

EAP
EAP

Computer Security and Penetration Testing Chapter 16 Windows
Computer Security and Penetration Testing Chapter 16 Windows

A Secure Anti-Collusion Data Sharing Scheme for
A Secure Anti-Collusion Data Sharing Scheme for

Parameter tuning and cross-validation algorithms
Parameter tuning and cross-validation algorithms

FEARLESS - Cyber Security Research and Education Institute
FEARLESS - Cyber Security Research and Education Institute

Document
Document

Slide 1
Slide 1

Computer and Information Security
Computer and Information Security

... Your Web browser uses SSL protocol SSL relies on cryptography Access control issues arise All security mechanisms are in software ...
Operating System Security Chapter 9 Operating System Security
Operating System Security Chapter 9 Operating System Security

Harvard SEAS Information Security Office Services Overview
Harvard SEAS Information Security Office Services Overview

Jensen3
Jensen3

module_70
module_70

Rivest-Shamir
Rivest-Shamir

ppt
ppt

TNS03%20Introduction%20to%20Network%20Security
TNS03%20Introduction%20to%20Network%20Security

Are Clouds Secure? - San Francisco Bay Area ISSA Chapter
Are Clouds Secure? - San Francisco Bay Area ISSA Chapter

Are Clouds Secure?
Are Clouds Secure?

lec12c-Simon
lec12c-Simon

William Stallings, Cryptography and Network Security 3/e
William Stallings, Cryptography and Network Security 3/e

Network Security
Network Security

WelcometoCISandCybercorps
WelcometoCISandCybercorps

FOI Memo 5492 Nr 3
FOI Memo 5492 Nr 3

Foundations of Information Security Webcast - ABA
Foundations of Information Security Webcast - ABA

< 1 ... 12 13 14 15 16 17 18 19 20 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report