2017
DOI: 10.1038/nature23461
|View full text |Cite
|
Sign up to set email alerts
|

Post-quantum cryptography

Abstract: Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive to remain secure even in this scenario. This relatively young research area has seen some successes in identifying mathematical operations for which quantum algor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
198
0
5

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 458 publications
(266 citation statements)
references
References 56 publications
(61 reference statements)
1
198
0
5
Order By: Relevance
“…However, since Shor's seminal result [Sho94] it is known that those asymmetric cryptosystems can be broken in polynomial time on a quantum computer (see [BBD08]). Currently, quantum computers are not available but in recent years there has been a big financial push, by both governments and private enterprises (see [Cha12,Koe13,RG13]), to construct a fully-functioning and large enough quantum computer.…”
Section: Quantum Computing and Post-quantum Cryptographymentioning
confidence: 99%
See 4 more Smart Citations
“…However, since Shor's seminal result [Sho94] it is known that those asymmetric cryptosystems can be broken in polynomial time on a quantum computer (see [BBD08]). Currently, quantum computers are not available but in recent years there has been a big financial push, by both governments and private enterprises (see [Cha12,Koe13,RG13]), to construct a fully-functioning and large enough quantum computer.…”
Section: Quantum Computing and Post-quantum Cryptographymentioning
confidence: 99%
“…Such schemes are called post-quantum and the research area that deals with the design, analysis, and evaluation of cryptographic schemes that will still be secure in a world where quantum computers exist, is called post-quantum cryptography (PQC). In this field four major research areas have emerged, which are hash-based, code-based, multivariate-quadraticequations-based, and lattice-based cryptography [BBD08]. Additionally, cryptosystems based on supersingular elliptic curve isogenies are also supposed to be secure against attacks by quantum computers [JF11].…”
Section: Quantum Computing and Post-quantum Cryptographymentioning
confidence: 99%
See 3 more Smart Citations