Postquantum cryptography, part 2

6Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This is part 2 of IEEE Security & Privacy magazine's special issue on Postquantum Cryptography. As explained in the introduction to part 1, public-key cryptography is indispensable for the security of open computer networks, particularly the Internet. Because of public-key cryptography's relevance and quantum computers' increasingly realistic threat to this technology, it's necessary to come up with practical and secure postquantum cryptography - that is, public-key cryptography that can be expected to resist quantum computer attacks.

Cite

CITATION STYLE

APA

Buchmann, J., Lauter, K., & Mosca, M. (2018, September 1). Postquantum cryptography, part 2. IEEE Security and Privacy. Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/MSP.2018.3761714

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free