• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Floating point
Floating point

systemsprinciples2
systemsprinciples2

SDN in OpenStack – A real-life Implementation
SDN in OpenStack – A real-life Implementation

About EICTA - Baltic IT&T Review
About EICTA - Baltic IT&T Review

Chapter 19: Security
Chapter 19: Security

Chapter 19: Security - Murray State University
Chapter 19: Security - Murray State University

Chapter 19: Security
Chapter 19: Security

PPT
PPT

Distributed System Concepts and Architectures
Distributed System Concepts and Architectures

Competency: Defend and Attack (virus, spam, spyware - FBLA-PBL
Competency: Defend and Attack (virus, spam, spyware - FBLA-PBL

answer-sheet-7540-040-7630-345-b_
answer-sheet-7540-040-7630-345-b_

Heap Sort
Heap Sort

Slide 1
Slide 1

Power point
Power point

PDF sample
PDF sample

Introduction to Healthcare Information Technology
Introduction to Healthcare Information Technology

PowerPoint
PowerPoint

Cooperative Power
Cooperative Power

Click to add title - toostusuudised.ee
Click to add title - toostusuudised.ee

Data Representation Methods
Data Representation Methods

Security - The University of Texas at Dallas
Security - The University of Texas at Dallas

"O brave new world, that has such people in`t
"O brave new world, that has such people in`t

... Huxley, who borrowed it for his futuristic novel, imagined hacktivists, spearphishers, or digital terrorists and organized crime lords. But cyber criminals are top of the mind for CEOs of companies ranging from The New York Times to Coca-Cola. They've wrecked havoc on law firms, financial houses, un ...
TrendMicro Titanium - A New Concept in Security by Ira Wilsker
TrendMicro Titanium - A New Concept in Security by Ira Wilsker

DNS Session 5 Additional Topics
DNS Session 5 Additional Topics

Main Title 32pt
Main Title 32pt

< 1 ... 16 17 18 19 20 21 22 23 24 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report