The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Post-Quantum Cryptography and Quantum Cloning
Abstract
In the last two decades, the field of post-quantum cryptography has had an overwhelming response among research communities. The ability of quantum computers to factorize large numbers could break many of well-known RSA cryptosystem and discrete log-based cryptosystem. Thus, post-quantum cryptography offers secure alternatives which are implemented on classical computers and is secure against attacks by quantum computers. The significant benefits of post-quantum cryptosystems are that they can be executed quickly and efficiently on desktops, smartphones, and the Internet of Things (IoTs) after some minor software updates. The main objective of this chapter is to give an outline of major developments in privacy protectors to reply to the forthcoming threats caused by quantum systems. In this chapter, we have presented crucial classes of cryptographic systems to resist attacks by classical and quantum computers. Furthermore, a review of different classes of quantum cloning is presented.
Related Content
M. Suchetha, Jaya Sai Kotamsetti, Dasapalli Sasidhar Reddy, S. Preethi, D. Edwin Dhas.
© 2024.
14 pages.
|
A. Bhuvaneswari, R. Srivel, N. Elamathi, S. Shitharth, K. Sangeetha.
© 2024.
15 pages.
|
Srinivas Kumar Palvadi.
© 2024.
28 pages.
|
Srinivas Kumar Palvadi.
© 2024.
20 pages.
|
Nitika Kapoor, Parminder Singh, Kusrini M. Kom, Vishal Bharti.
© 2024.
19 pages.
|
M. Suchetha, V. V. Rama Raghavan, Shaik Fardeen, P. V. S. Nithish, S. Preethi, D. Edwin Dhas.
© 2024.
13 pages.
|
Damandeep Kaur, Shamandeep Singh, Simarjeet Kaur, Gurpreet Singh, Rani Kumari.
© 2024.
17 pages.
|
|
|