分类:文章
Post
Exploring Post Quantum Cryptography with Quantum Key
ACM Digital Libraryhttps://dl.acm.org/doi/abs/10.1145/3659997.3660033Exploring Post Quantum Cryptography with Quantum Key …2024年9月11日 · The proliferation of mobile networks and their increasing importance to modern life, combined with the emerging threat of quantum computing, present new challenges and opportunities for cyber-security.
Quantum computing threat How to prepare for a smooth transition
ANSSI views on the Post
Semantic Scholarhttps://www.semanticscholar.org/paper/ANSSI-views-on-the-Post-Quantum-Crypt…ANSSI views on the Post-Quantum Cryptography transitionIn this position paper, ANSSI recalls the context of the quantum threat and introduces a provisional transition agenda to mitigate this quantum threat with a progressive increase of assurance on the new post-quantum algorithms without introducing any vulnerability. In this position paper, the current ANSSI views on the so-called post-quantum cryptography transition …