• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Foundations of Information Security Webcast - ABA
Foundations of Information Security Webcast - ABA

Quantum Mechanics and Closed Timelike Curves
Quantum Mechanics and Closed Timelike Curves

Network Security
Network Security

Guide to Operating System Security
Guide to Operating System Security

Robust. Reliable. Factory Line. Industrial Security redefined protecting industrial networks
Robust. Reliable. Factory Line. Industrial Security redefined protecting industrial networks

5th Chapter - information systems and it audit
5th Chapter - information systems and it audit

Troubleshooting Guide Maytag Neptune™ LED Gas Dryer 6390 2110
Troubleshooting Guide Maytag Neptune™ LED Gas Dryer 6390 2110

Chapter 9
Chapter 9

john p. carlin - AFCEA International
john p. carlin - AFCEA International

Introduction to z/OS Security
Introduction to z/OS Security

D1S1_TSV404_Course_Intro_2011_v1
D1S1_TSV404_Course_Intro_2011_v1

Threat Briefing - (AFCEA) Ottawa Chapter
Threat Briefing - (AFCEA) Ottawa Chapter

Apply encryption to network and system security
Apply encryption to network and system security

45.3% of employees are aware that their workplace can be
45.3% of employees are aware that their workplace can be

Introduction to Algorithms
Introduction to Algorithms

Performance-aware Security for Unicast Communication in Hybrid Satellite Networks
Performance-aware Security for Unicast Communication in Hybrid Satellite Networks

“The global quantum duality principle: theory, examples, and
“The global quantum duality principle: theory, examples, and

Lecture 10 - The University of Texas at Dallas
Lecture 10 - The University of Texas at Dallas

Protection
Protection

View File
View File

Document
Document

Final bits of OS - Department of Computer Science
Final bits of OS - Department of Computer Science

Introduction to IT Security - Virginia Alliance for Secure Computing
Introduction to IT Security - Virginia Alliance for Secure Computing

Q10 Study Guide - FSU Computer Science
Q10 Study Guide - FSU Computer Science

PSWG Closed Door Proposal - Western Electricity Coordinating
PSWG Closed Door Proposal - Western Electricity Coordinating

< 1 ... 13 14 15 16 17 18 19 20 21 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report