• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
security
security

Course Learning Objectives:
Course Learning Objectives:

Implementing Security for Electronic Commerce
Implementing Security for Electronic Commerce

北海道大学シラバス - 北海道大学工学部
北海道大学シラバス - 北海道大学工学部

PHYS6510/4510 Quantum Mechanics I Fall 2012 HW #5
PHYS6510/4510 Quantum Mechanics I Fall 2012 HW #5

`12
`12

Current Issues in Maintaining a Secure System
Current Issues in Maintaining a Secure System

new zealand`s cyber security strategy
new zealand`s cyber security strategy

Crypto in data security
Crypto in data security

Introduction to quantum cryptography
Introduction to quantum cryptography

Malicious Cryptography : Exposing Cryptovirology
Malicious Cryptography : Exposing Cryptovirology

CH 8 – Review - WordPress.com
CH 8 – Review - WordPress.com

Subject Group of Applied Physics
Subject Group of Applied Physics

Blue Border - Courant Institute of Mathematical Sciences
Blue Border - Courant Institute of Mathematical Sciences

• Overview of Cyber Security & need of cyber security • Introduction
• Overview of Cyber Security & need of cyber security • Introduction

Genigraphics Research Poster Template 44x44
Genigraphics Research Poster Template 44x44

Single Photon Polarization
Single Photon Polarization

compatible-development-of
compatible-development-of

Chapter 08
Chapter 08

Author Guidelines for 8 - Al
Author Guidelines for 8 - Al

Why Cryptography is Harder Than It Looks
Why Cryptography is Harder Than It Looks

Quantum Cryptography
Quantum Cryptography

Network Security
Network Security

Preface
Preface

Cryptography and Coding Theory
Cryptography and Coding Theory

< 1 ... 25 26 27 28 29 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report