Quantum cryptography in 5G networks: a comprehensive overview
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …
VoIP call, instant message or other use of telecommunications systems involves …
An introduction to quantum computing for non-physicists
Richard Feynman's observation that certain quantum mechanical effects cannot be
simulated efficiently on a computer led to speculation that computation in general could be …
simulated efficiently on a computer led to speculation that computation in general could be …
[HTML][HTML] How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits
We significantly reduce the cost of factoring integers and computing discrete logarithms in
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …
Massively parallel probabilistic computing with sparse Ising machines
Solving computationally hard problems using conventional computing architectures is often
slow and energetically inefficient. Quantum computing may help with these challenges, but it …
slow and energetically inefficient. Quantum computing may help with these challenges, but it …
Imperfect forward secrecy: How Diffie-Hellman fails in practice
We investigate the security of Diffie-Hellman key exchange as used in popular Internet
protocols and find it to be less secure than widely believed. First, we present Logjam, a …
protocols and find it to be less secure than widely believed. First, we present Logjam, a …
Candidate multilinear maps from ideal lattices
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …
Quantum resource estimates for computing elliptic curve discrete logarithms
We give precise quantum resource estimates for Shor's algorithm to compute discrete
logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of …
logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of …
Fast accurate state measurement with superconducting qubits
Faster and more accurate state measurement is required for progress in superconducting
qubit experiments with greater numbers of qubits and advanced techniques such as …
qubit experiments with greater numbers of qubits and advanced techniques such as …
Algorithms for quantum computation: discrete logarithms and factoring
PW Shor - … 35th annual symposium on foundations of computer …, 1994 - ieeexplore.ieee.org
A computer is generally considered to be a universal computational device; ie, it is believed
able to simulate any physical computational device with a cost in computation time of at most …
able to simulate any physical computational device with a cost in computation time of at most …
[图书][B] Handbook of applied cryptography
AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …
important discipline that is not only the subject of an enormous amount of research, but …