• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
14-Wireless-Security - Communications Systems Center
14-Wireless-Security - Communications Systems Center

01-Intro
01-Intro

XML: Part - Houston Community College System
XML: Part - Houston Community College System

Types of Encryption Algorithms
Types of Encryption Algorithms

8.1 - Nitish Chandan
8.1 - Nitish Chandan

Telos Audio Design Co., Ltd. is one of the distinguished audio
Telos Audio Design Co., Ltd. is one of the distinguished audio

Chapter. 01
Chapter. 01

Shawn Bracken - CISSP103 Chester StMenlo Park, CA 94025
Shawn Bracken - CISSP103 Chester StMenlo Park, CA 94025

...  Supported HP-UX Trusted Systems secure accounting/auditing and kernel configuration  Our team was the 3rd layer support known as "backline" which handled the more difficult and time-consuming calls.  Most customers were large production systems requiring high uptime. 1997 to 1998, Network Securi ...
CNG 131 – Principles of Information Assurance Provides students
CNG 131 – Principles of Information Assurance Provides students

Underlying Problem Fact Sheet - Future Problem Solving of Virginia
Underlying Problem Fact Sheet - Future Problem Solving of Virginia

Algorithm 1.1  Sequential Search Problem Inputs Outputs
Algorithm 1.1 Sequential Search Problem Inputs Outputs

ISEC0511
ISEC0511

PPT - CS
PPT - CS

PPTX
PPTX

Quantum Resistant Cryptography
Quantum Resistant Cryptography

technology neutrality on electronic signatures
technology neutrality on electronic signatures

Unit 11
Unit 11

Lesson Plan: Quantum Mechanics
Lesson Plan: Quantum Mechanics

Document
Document

Can computer science help physicists resolve the
Can computer science help physicists resolve the

AxxonSoft and Quantum Create a Powerful Solution
AxxonSoft and Quantum Create a Powerful Solution

The key questions that we`d like to ask at the beginning
The key questions that we`d like to ask at the beginning

Security
Security

Packaging Information: Data Compression and
Packaging Information: Data Compression and

01 Computer security overview
01 Computer security overview

< 1 ... 20 21 22 23 24 25 26 27 28 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report