<--- Back to Details
First PageDocument Content
Quantum cryptography / Quantum information science / Key management / Quantum computer / Quantum key distribution / Quantum algorithm / Public-key cryptography / Elliptic curve cryptography / Quantum information / Cryptography / Applied mathematics / Theoretical computer science
Date: 2014-10-04 16:44:20
Quantum cryptography
Quantum information science
Key management
Quantum computer
Quantum key distribution
Quantum algorithm
Public-key cryptography
Elliptic curve cryptography
Quantum information
Cryptography
Applied mathematics
Theoretical computer science

Quantum Safe Whitepaper 1 0 0

Add to Reading List

Source URL: docbox.etsi.org

Download Document from Source Website

File Size: 1,74 MB

Share Document on Facebook

Similar Documents

Mathematics / Algebra / Equations / Linear algebra / Monomial / Ordinary differential equations / Recurrence relation / Equation solving / Elementary algebra / Equation / System of linear equations / Algebraic curve

Asymptotically faster quantum algorithms to solve multivariate quadratic equations Daniel J. Bernstein1 and Bo-Yin Yang2 1 Department of Computer Science

DocID: 1xUCK - View Document

Quantum Physics Meets Distributed Computing No one can doubt, that in the near future, our lives will be changed by a number of exciting scientific progresses. The quantum computer could be such a major invention. Using

DocID: 1vjlT - View Document

Chapter 2 Quantum Computing Principles The massive amount of processing power generated by computer manufacturers has not yet been able to quench our thirst for speed and computing capacity. In 1947, American computer e

DocID: 1v5Pz - View Document

CSE 599d - Quantum Computing Grover’s Algorithm Dave Bacon Department of Computer Science & Engineering, University of Washington After Peter Shor demonstrated that quantum computers could efficiently factor, great in

DocID: 1v35w - View Document

Cryptography / Cryptanalysis / RSA / Quantum computing / Public-key cryptography / Symmetric-key algorithm / Cryptographic primitive / Stream cipher / Block cipher / One-way function / Chosen-plaintext attack / Cryptographic hash function

Dartmouth College Computer Science Technical Report TR2002The Future of Cryptography Under Quantum Computers

DocID: 1uujH - View Document