• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
IPSEC Presentation
IPSEC Presentation

Chapter 5 - Department of Computer Science and Information Systems
Chapter 5 - Department of Computer Science and Information Systems

6.1. Elliptic Curve Cryptography
6.1. Elliptic Curve Cryptography

Algorithms, Complexity and Quantum Fourier Transform
Algorithms, Complexity and Quantum Fourier Transform

Lect 1 - Intro
Lect 1 - Intro

The Learnability of Quantum States
The Learnability of Quantum States

Guide to Firewalls and Network Security with Intrusion Detection and
Guide to Firewalls and Network Security with Intrusion Detection and

Secure Deduplication with Efficient and Reliable
Secure Deduplication with Efficient and Reliable

Security and Privacy in Sensor Networks: Research Challenges
Security and Privacy in Sensor Networks: Research Challenges

XML Security Standards — Overview for the Non - Events
XML Security Standards — Overview for the Non - Events

Quantum information with Rydberg atoms
Quantum information with Rydberg atoms

How Much Information Is In A Quantum State?
How Much Information Is In A Quantum State?

Systems Security
Systems Security

Network Security Analysis Prepared By: cowave Communication
Network Security Analysis Prepared By: cowave Communication

Another version - Scott Aaronson
Another version - Scott Aaronson

notes
notes

Wireless Networking & Security
Wireless Networking & Security

Introduction - Personal Web Pages
Introduction - Personal Web Pages

Protecting Valuable Physical Assets in a High Traffic Setting
Protecting Valuable Physical Assets in a High Traffic Setting

The CyberFence Difference
The CyberFence Difference

FS2015 - Dr. T`s Wonderful World
FS2015 - Dr. T`s Wonderful World

... Intelligence • CS5401 Evolutionary Computing • CS6400 Advanced Topics in Artificial Intelligence • CS6401 Advanced Evolutionary Computing ...
Well-Tempered Clavier
Well-Tempered Clavier

Alice and Bob Get Physical: Insights into Physical Layer Security
Alice and Bob Get Physical: Insights into Physical Layer Security

Slides on Security
Slides on Security

NP Complexity
NP Complexity

< 1 ... 23 24 25 26 27 28 29 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report