Text
Quantum attacks on public-key cryptosystems
CONTENTS:
1.Classic and Quantum Computation
1.1.Classical Computability Theory
1.2.Classical Complexity Theory
1.3.Quantum Information and Computation
1.4.Quantum Computability and Complexity
1.5.Conclusions, Notes, and Further Reading
References
2.Quantum Attacks on IFP-Based Cryptosystems
2.1.IFP and Classical Solutions to IFP
2.2.IFP-Based Cryptography
2.3.Quantum Attacks on IFP and IFP-Based Cryptography
2.4.Conclusions, Notes, and Further Reading
3.Quantum Attacks on DLP-Based Cryptosystems
3.1.DLP and Classic Solutions to DLP
3.2.DLP-Based Cryptography
3.3.Quantum Attack on DLP and DLP-Based Cryptography
3.4.Conclusions, Notes, and Further Reading
4.Quantum Attacks on ECDLP-Based Cryptosystems
4.1.ECDLP and Classical Solutions
4.2.ECDLP-Based Cryptography
4.3.Quantum Attack on ECDLP-Based Cryptography
4.4.Conclusions, Notes, and Further Reading
Contents note continued: 5.Quantum Resistant Cryptosystems
5.1.Quantum-Computing Attack Resistant
5.2.Coding-Based Cryptosystems
5.3.Lattice-Based Cryptosystems
5.4.Quantum Cryptosystems
5.5.DNA Biological Cryptography
5.6.Conclusions, Notes, and Further Reading
References.
No other version available