Post-Quantum Cryptography. Bernstein, D. J. and Lange, T. 549(7671):188–194.
Post-Quantum Cryptography [link]Paper  doi  abstract   bibtex   
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.
@article{bernsteinPostquantumCryptography2017,
  title = {Post-Quantum Cryptography},
  author = {Bernstein, Daniel J. and Lange, Tanja},
  date = {2017-09},
  journaltitle = {Nature},
  volume = {549},
  pages = {188--194},
  issn = {0028-0836},
  doi = {10.1038/nature23461},
  url = {https://doi.org/10.1038/nature23461},
  abstract = {Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algorithms offer little advantage in speed, and then building cryptographic systems around those. The central challenge in post-quantum cryptography is to meet demands for cryptographic usability and flexibility without sacrificing confidence.},
  keywords = {*imported-from-citeulike-INRMM,~INRMM-MiD:c-14431273,comparison,computational-science,cryptography,cyber-security,quantum-computing,review,technology-mediated-communication},
  number = {7671}
}
Downloads: 0