• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Slide 1
Slide 1

Presentation4 - University Of Worcester
Presentation4 - University Of Worcester

Lecture on Security
Lecture on Security

pptx
pptx

billion billion
billion billion

Extremely Large-Ratio Quantum Down Conversion
Extremely Large-Ratio Quantum Down Conversion

Document
Document

IPSec (IP Security)
IPSec (IP Security)

CSE 506/606 NSC Nonstandard Computation Winter Quarter 2004
CSE 506/606 NSC Nonstandard Computation Winter Quarter 2004

Richard D - Expert Witness Network
Richard D - Expert Witness Network

Database Security
Database Security

Are you looking for an easier way to initiate and
Are you looking for an easier way to initiate and

Lecture 3.1 - Host
Lecture 3.1 - Host

super.bu.edu
super.bu.edu

Enhancement of Security through a Cryptographic Algorithm
Enhancement of Security through a Cryptographic Algorithm

256 Bit Key — Is It Big Enough?
256 Bit Key — Is It Big Enough?

Security at the Operating System Level (Microsoft)
Security at the Operating System Level (Microsoft)

... “Next Generation Secure Computing Base for Windows” by Microsoft . Conclusion. ...
Quantum
Quantum

IRC916E - IRC412 Code Reset
IRC916E - IRC412 Code Reset

Detailed Overview of Security and Privacy lecture slides
Detailed Overview of Security and Privacy lecture slides

Security & Privacy on the WWW
Security & Privacy on the WWW

Overview of Operating Systems Security Features
Overview of Operating Systems Security Features

Information Security - National University of Sciences and
Information Security - National University of Sciences and

CIT 016 Review for Final
CIT 016 Review for Final

Security
Security

< 1 ... 21 22 23 24 25 26 27 28 29 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report