• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Terminology: Lecture 1 Name:_____________________
Terminology: Lecture 1 Name:_____________________

Algorithms Lecture 2 Name:_________________
Algorithms Lecture 2 Name:_________________

Lecture 10
Lecture 10

Visualization
Visualization

Lecture 25 - Data Encryption
Lecture 25 - Data Encryption

Security Risks
Security Risks

WHAT IS EC SECURITY? - Joseph H. Schuessler, PhD
WHAT IS EC SECURITY? - Joseph H. Schuessler, PhD

MT311-14
MT311-14

Algorytm GEO
Algorytm GEO

29-sets-dictionaries
29-sets-dictionaries

... • Write a program that counts the number of unique words in a large text file (say, Moby Dick or the King James Bible). • Store the words in a structure and report the # of unique words. • Once you've created this structure, allow the user to search it to see whether various words appear in the text ...
ECSP – EC-Council Certified Secure Programmer
ECSP – EC-Council Certified Secure Programmer

Issues in Inflationary and Cyclic Cosmology
Issues in Inflationary and Cyclic Cosmology

FS2008
FS2008

Quantum vs. classical - University of Bristol
Quantum vs. classical - University of Bristol

Information Security in the New Millennium
Information Security in the New Millennium

Network Infrastructure Security
Network Infrastructure Security

Chapter X Slides
Chapter X Slides

IT Security is only as Strong as the Weakest Link
IT Security is only as Strong as the Weakest Link

Presentation Prepared By: Raghda Zahran
Presentation Prepared By: Raghda Zahran

1,0 - DidaWiki
1,0 - DidaWiki

Secure Email
Secure Email

Course Name : INFORMATION SECURITY
Course Name : INFORMATION SECURITY

Addressing security threats and vulnerabilities
Addressing security threats and vulnerabilities

HIPAA Security Standards
HIPAA Security Standards

(FIPS) 140-2 - Aviat Networks
(FIPS) 140-2 - Aviat Networks

< 1 ... 15 16 17 18 19 20 21 22 23 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report