• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Application Security
Application Security

Lecture 12 : Identity and Equality I
Lecture 12 : Identity and Equality I

EE579T-Class 4
EE579T-Class 4

Constant-Time Local Computation Algorithms
Constant-Time Local Computation Algorithms

On Lattices, Learning with Errors, Random Linear Codes, and
On Lattices, Learning with Errors, Random Linear Codes, and

Governance Guidance
Governance Guidance

Governance Guidance - Top Actions
Governance Guidance - Top Actions

Governance Guidance - Top Actions
Governance Guidance - Top Actions

Seven Challenges in Parallel SAT Solving
Seven Challenges in Parallel SAT Solving

Exact discovery of length-range motifs
Exact discovery of length-range motifs

slides [pdf]
slides [pdf]

Introduction to Computer Security
Introduction to Computer Security

Waukesha County Technical College
Waukesha County Technical College

LEC01 - aiub study guide
LEC01 - aiub study guide

Hamiltonian and measuring time for analog quantum search
Hamiltonian and measuring time for analog quantum search

for Sublinear Time Maximum Inner Product Search (MIPS)
for Sublinear Time Maximum Inner Product Search (MIPS)

the catalogue here
the catalogue here

Time-Memory Trade-Off for Lattice Enumeration in a Ball
Time-Memory Trade-Off for Lattice Enumeration in a Ball

Longest Common Substring with Approximately k Mismatches
Longest Common Substring with Approximately k Mismatches

The Real Cost of Free Programs such as Instant
The Real Cost of Free Programs such as Instant

Era of Spybots - A Secure Design Solution Using
Era of Spybots - A Secure Design Solution Using

Paper ~ Which Algorithm Should I Choose At Any Point of the
Paper ~ Which Algorithm Should I Choose At Any Point of the

EC2004_ch12
EC2004_ch12

Document
Document

Blame Trees - Edward Z. Yang
Blame Trees - Edward Z. Yang

< 1 2 3 4 5 6 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report