• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Lakshmi Nannapaneni`s presentation on Patterns for Secure Boot
Lakshmi Nannapaneni`s presentation on Patterns for Secure Boot

Introduction to Information Security
Introduction to Information Security

Ingen bildrubrik
Ingen bildrubrik

Chapter 5 Protection of Information Assets
Chapter 5 Protection of Information Assets

Genetic Algorithms Without Parameters
Genetic Algorithms Without Parameters

Cardenas_Claudia_WorkShopSlides
Cardenas_Claudia_WorkShopSlides

離散對數密碼系統 - 國立交通大學資訊工程學系NCTU Department of
離散對數密碼系統 - 國立交通大學資訊工程學系NCTU Department of

TAKA_10v1_public-key cryptosystems bsed on CR
TAKA_10v1_public-key cryptosystems bsed on CR

A Communications Security Architecture and Cryptographic
A Communications Security Architecture and Cryptographic

Internet Security
Internet Security

Slides
Slides

Auditing Corporate Information Security
Auditing Corporate Information Security

- Whatcom Community College
- Whatcom Community College

The Role of People in Security
The Role of People in Security

... Overview of Baselines • The process of establishing a system’s security state is called baselining. • The resulting product is a security baseline that allows the system to run safely and securely. • Once the process has been completed, any similar systems can be configured with the same baseline to ...
Federal Systems Level Guidance for Securing
Federal Systems Level Guidance for Securing

CH10
CH10

Educause Task Force on Systems Security
Educause Task Force on Systems Security

fundamentals of algorithms
fundamentals of algorithms

document
document

AFOSR_review_Jul10 - Northwestern University
AFOSR_review_Jul10 - Northwestern University

Information Security Incident Management
Information Security Incident Management

SECURITY METRICS FOR ENTERPRISE INFORMATION SYSTEMS Interdisciplinarity – New Approaches and Perspectives
SECURITY METRICS FOR ENTERPRISE INFORMATION SYSTEMS Interdisciplinarity – New Approaches and Perspectives

MAC Address Authentication - Faculty Website Directory
MAC Address Authentication - Faculty Website Directory

Deployment of Sensing Devices on Critical Infrastructure
Deployment of Sensing Devices on Critical Infrastructure

Cutting Edge VoIP Security Issues Color
Cutting Edge VoIP Security Issues Color

< 1 ... 3 4 5 6 7 8 9 10 11 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report