3. Quantum Safe Cryptography
As Toshiba's ETSI ISG QKD said, to ensure the persistent security of exchanged and stored data, two approaches need to be conducted in parallel:
search for new public key management techniques resistant to the threat of decryption using quantum algorithms;
implement quantum-safe cryptography, i.e. cryptography that is not compromised by the deployment of quantum computers.
3.1 White paper on security and resistant cryptography for quantum computers
ETSI organizes international ICT conferences every year, including two on QSC (2013 and 2014). In addition to the presentations submitted online, the synthesis of the work was published in e-proceeding in 2013 [Mosca13]...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Quantum Safe Cryptography
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!