Quantum attacks on public-key cryptosystems
DOI10.1007/978-1-4419-7722-9zbMATH Open1273.94006OpenAlexW640786531MaRDI QIDQ4933535FDOQ4933535
Authors: Song Yuan Yan
Publication date: 14 October 2010
Full work available at URL: https://doi.org/10.1007/978-1-4419-7722-9
Recommendations
RSAdiscrete logarithm problemquantum cryptographyECDLPElGamalECCShor's quantum factorization algorithm
Research exposition (monographs, survey articles) pertaining to information and communication theory (94-02) Cryptography (94A60) Quantum computation (81P68) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cited In (14)
- Quantum attacks on Lai-Massey structure
- Title not available (Why is that?)
- Quantum algorithms for typical hard problems: a perspective of cryptanalysis
- Title not available (Why is that?)
- Formal verification of Saber's public-key encryption scheme in easycrypt
- On the dimension of the subfield subcodes of 1-point Hermitian codes
- Quantum attacks on some Feistel block ciphers
- A note on quantum related-key attacks
- Title not available (Why is that?)
- Introduction to post-quantum cryptography
- Commutative Encryption Method Based on Hidden Logarithm Problem
- Title not available (Why is that?)
- Quantum attacks on beyond-birthday-bound MACs
- McEliece and Niederreiter cryptosystems that resist quantum Fourier sampling attacks
This page was built for publication: Quantum attacks on public-key cryptosystems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4933535)