• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Linux OS : Security Aspects
Linux OS : Security Aspects

... Third Andean Workshop on Electronic Communications, 20-24 November 2000, Lima, PERU ...
Algebra 1 Essentials Chapter 3 Quiz
Algebra 1 Essentials Chapter 3 Quiz

Chapter 4
Chapter 4

Wavelength management in WDM rings to maximize the
Wavelength management in WDM rings to maximize the

ppt
ppt

Oracle9i Security
Oracle9i Security

PPT_ch01 - Mercer University Computer Science Department
PPT_ch01 - Mercer University Computer Science Department

Secure_Email_and_Web_Browsing_SEC
Secure_Email_and_Web_Browsing_SEC

Security+ Guide to Network Security Fundamentals, Third Edition
Security+ Guide to Network Security Fundamentals, Third Edition

Defense In Depth
Defense In Depth

Applying Genetic Algorithms to the U
Applying Genetic Algorithms to the U

Datasäkerhet/Data security EDA625 – Lect2 CRYPTOGRAPHY
Datasäkerhet/Data security EDA625 – Lect2 CRYPTOGRAPHY

Math 373-578 Exam 3 - WVU Math Department
Math 373-578 Exam 3 - WVU Math Department

Locality Preserving Hashing Kang Zhao, Hongtao Lu and Jincheng Mei
Locality Preserving Hashing Kang Zhao, Hongtao Lu and Jincheng Mei

Rosa Lopez
Rosa Lopez

Part 3: Lattice: Quantum to Ising to RG
Part 3: Lattice: Quantum to Ising to RG

High-performance Energy Minimization in Spin
High-performance Energy Minimization in Spin

Organizations That Use TLS/SSL
Organizations That Use TLS/SSL

Web Site Development Tools
Web Site Development Tools

Chapter 15
Chapter 15

21. immobilizer system (hiss)
21. immobilizer system (hiss)

ppt
ppt

Principles of Computer Security
Principles of Computer Security

Security Policies, Standards, and Planning
Security Policies, Standards, and Planning

pptx - Electrical and Computer Engineering
pptx - Electrical and Computer Engineering

< 1 2 3 4 5 6 7 8 ... 30 >

Post-quantum cryptography

Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. This is not true of the most popular public-key algorithms which can be efficiently broken by a sufficiently large quantum computer. The problem with the currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently large quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers are too small to attack any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several European Telecommunications Standards Institute (ETSI) Workshops on Quantum Safe Cryptography.In contrast to the threat quantum computing poses to current public key algorithms, most current symmetric cryptographic algorithms (symmetric ciphers and hash functions) are considered to be relatively secure from attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See Section on Symmetric Key Approach below.Post-quantum cryptography is distinct from quantum cryptography, which refers to using quantum phenomena to achieve secrecy.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report