Post-Quantum Cryptography Using Hyper-Complex Numbers

Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Kamlofsky, Jorge, Hecht, Pedro
Formato: Objeto de conferencia
Lenguaje:Español
Publicado: 2017
Materias:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/63938
Aporte de:

Ejemplares similares