Quantum Attacks on Public-Key Cryptosystems
From MaRDI portal
Publication:4933535
DOI10.1007/978-1-4419-7722-9zbMath1273.94006OpenAlexW640786531MaRDI QIDQ4933535
Publication date: 14 October 2010
Full work available at URL: https://doi.org/10.1007/978-1-4419-7722-9
RSAdiscrete logarithm problemquantum cryptographyElGamalECDLPECCShor's quantum factorization algorithm
Quantum computation (81P68) Cryptography (94A60) Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (6)
Unnamed Item ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Formal verification of Saber's public-key encryption scheme in easycrypt ⋮ On the dimension of the subfield subcodes of 1-point Hermitian codes ⋮ Commutative Encryption Method Based on Hidden Logarithm Problem
This page was built for publication: Quantum Attacks on Public-Key Cryptosystems