2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT) 2017
DOI: 10.1109/icecct.2017.8117822
|View full text |Cite
|
Sign up to set email alerts
|

A novel technique to modify the SHOR'S algorithm — Scaling the encryption scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The core of Shor algorithm [27,28] is to transform the factorization process of numbers into the period of a function by using some number theories. Multiplication of two large prime numbers is a simple thing, but it is difficult to factorize the product.…”
Section: ) Shor Quantum Search Algorithmmentioning
confidence: 99%
“…The core of Shor algorithm [27,28] is to transform the factorization process of numbers into the period of a function by using some number theories. Multiplication of two large prime numbers is a simple thing, but it is difficult to factorize the product.…”
Section: ) Shor Quantum Search Algorithmmentioning
confidence: 99%
“…A PRNG involved in a cryptographic algorithm does not add to its system's security if the generator can be reverse engineered in reasonable time. Further, the attacks and methods to reverse engineer the [usually known] deterministic PRNG process often arise after the PRNG is in place, impacting the security of all previous data transported via the system [53]; even our best algorithms [54] possess identified vulnerabilities as future computing methods become available [55]. A variety of reverse-engineering attacks have been developed to target the underlying PRNGs used in various systems.…”
Section: Introductionmentioning
confidence: 99%