• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
How to Encrypt with the LPN Problem
How to Encrypt with the LPN Problem

Time Complexity 1
Time Complexity 1

The Learnability of Quantum States
The Learnability of Quantum States

UNIT ONE: KEY TERMS Learn(ing)
UNIT ONE: KEY TERMS Learn(ing)

Enhancing the Security and Capacity of Collaborative Software for
Enhancing the Security and Capacity of Collaborative Software for

pps - AquaLab - Northwestern University
pps - AquaLab - Northwestern University

Another version - Scott Aaronson
Another version - Scott Aaronson

Chapter 1
Chapter 1

Hidden Markov Model Cryptanalysis
Hidden Markov Model Cryptanalysis

Teaching Cryptologic Mathematics
Teaching Cryptologic Mathematics

426_Fall10_lect01 - Purdue Computer Science
426_Fall10_lect01 - Purdue Computer Science

Chapter 24 - William Stallings, Data and Computer
Chapter 24 - William Stallings, Data and Computer

Chapter 1: Introduction to security
Chapter 1: Introduction to security

download
download

Here are the PowerPoint slides with links - Auto
Here are the PowerPoint slides with links - Auto

Electromechanical GateLok for Access Control of Tubular Steel and
Electromechanical GateLok for Access Control of Tubular Steel and

Problem Set 2
Problem Set 2

Homework 3
Homework 3

Department of Mathematics Research Colloquia 1998 – 2000  Dec 8 2000
Department of Mathematics Research Colloquia 1998 – 2000 Dec 8 2000

Cyber Challenges
Cyber Challenges

Hidden Markov Model Cryptanalysis
Hidden Markov Model Cryptanalysis

CN 2015 5 - SNGCE DIGITAL LIBRARY
CN 2015 5 - SNGCE DIGITAL LIBRARY

Network Technology Foundations
Network Technology Foundations

AtomicEye Attack Surface Manager
AtomicEye Attack Surface Manager

Protocol Overview
Protocol Overview

< 1 ... 19 20 21 22 23 24 25 26 27 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report