Leveraging the power of quantum computing for breaking RSA encryption
暂无分享,去创建一个
Moolchand Sharma | Vikas Choudhary | R. S. Bhatia | Sahil Malik | Anshuman Raina | Harshit Khandelwal | Vikas Choudhary | Moolchand Sharma | Sahil Malik | R. Bhatia | Anshuman Raina | Harshit Khandelwal
[1] Bahram Honary,et al. Reducible rank codes and their applications to cryptography , 2003, IEEE Trans. Inf. Theory.
[2] Serge Vaudenay,et al. Secure Communications over Insecure Channels Based on Short Authenticated Strings , 2005, CRYPTO.
[3] Ri-Gui Zhou,et al. Designing novel reversible BCD adder and parallel adder/subtraction using new reversible logic gates , 2012 .
[4] R. Jozsa,et al. Quantum Computation and Shor's Factoring Algorithm , 1996 .
[5] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[6] Xinwei Gong,et al. Quantifying the complexity of random Boolean networks. , 2012, Physical review. E, Statistical, nonlinear, and soft matter physics.
[7] Indivar Gupta,et al. Cryptological Applications of Permutation Polynomials , 2003, Electron. Notes Discret. Math..
[8] Peter W. Shor. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .
[9] Michal Horodecki,et al. Dynamical description of quantum computing: Generic nonlocality of quantum noise , 2002 .
[10] Mehrdad S. Sharbaf,et al. Quantum cryptography: An emerging technology in network security , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[11] R. S. Shorter,et al. Quantum physics: what everyone needs to know , 2018, Contemporary Physics.
[12] Nurhayat Varol,et al. A Review Paper on Cryptography , 2019, 2019 7th International Symposium on Digital Forensics and Security (ISDFS).
[13] Sándor Imre. Quantum computing and communications - Introduction and challenges , 2014, Comput. Electr. Eng..
[14] Adam Glos,et al. Impact of the malicious input data modification on the efficiency of quantum spatial search , 2018, Quantum Information Processing.