B Halak, T Gibson, M Henley, CB Botea, B Heath… - IEEE …, 2024 - ieeexplore.ieee.org
The accelerated development of quantum computers poses a direct threat to all current
standards of public key encryption, for example, the Shor algorithm exploits the …