Work-in-Progress: Security of Public-Key Schemes in the Quantum Computing Era–A Literature Review

B Redkins, I Kuzminykh, B Ghita - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Quantum computers, although still in the theoretical stage, conceptually have the power to
break many current cryptosystems, including public-key schemes., for example, RSA (Rivest …

[PDF][PDF] Security of Public-Key Schemes in the Quantum Computing Era–A Literature Review

B Redkins, I Kuzminykh, B Ghita - researchgate.net
Quantum computers, although still in the theoretical stage, conceptually have the power to
break many current cryptosystems, including public-key schemes, for example, RSA (Rivest …

[图书][B] Quantum-Safe Cryptography Algorithms and Approaches: Impacts of Quantum Computing on Cybersecurity

SP Yadav, R Singh, V Yadav, F Al-Turjman, SA Kumar - 2023 - degruyter.com
Quantum computers have demonstrated that they have the inherent potential to outperform
classical computers in many areas. One of the major impacts is that the currently available …

Cryptographic standards in the post-quantum era

D Moody, A Robinson - IEEE Security & Privacy, 2022 - ieeexplore.ieee.org
If large-scale quantum computers are ever built, they will compromise the security of many
commonly used cryptographic algorithms. In response, the National Institute of Standards …

[PDF][PDF] Recent trends on research and development of quantum computers and standardization of post-quantum cryptography

K Kan, M Une - 2021 - imes.boj.or.jp
The security of widely used public-key cryptographic algorithms (eg, RSA, elliptic-curve
cryptography) is expected to deteriorate once large-scale and fault-tolerant quantum …

Post Quantum Cryptography: impact to the public key cryptography

J Luukkanen - 2022 - theseus.fi
Public key cryptography plays an important role in people's daily lives, in the world of
business and in critical functions of society. A quantum computer is a computer that uses the …

Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond

T Attema, N Gervasoni, M Marcus, G Spini - Cryptology ePrint Archive, 2021 - eprint.iacr.org
The advent of a full-scale quantum computer will severely impact most currently-used
cryptographic systems. The most well-known aspect of this impact lies in the computational …

[HTML][HTML] Cryptography standards in quantum time: new wine in old wineskin?

L Chen - IEEE security & privacy, 2017 - ncbi.nlm.nih.gov
The National Institute of Standards and Technology (NIST) of the US Government
announced a call for proposals for quantum-resistant public-key cryptographic algorithms on …

[图书][B] Report on post-quantum cryptography

L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta… - 2016 - nvlpubs.nist.gov
In recent years, there has been a substantial amount of research on quantum computers–
machines that exploit quantum mechanical phenomena to solve mathematical problems that …

Will quantum computers be the end of public key encryption?

W Buchanan, A Woodward - Journal of Cyber Security Technology, 2017 - Taylor & Francis
The emergence of practical quantum computers poses a significant threat to the most
popular public key cryptographic schemes in current use. While we know that the well …