Introduction to post quantum cryptography


COMPUTER COURSE ONLINE

FREE-DOWNLOAD DJ Bernstein – Post-Quantum Cryptography, 2009
Imagine that it’s fifteen years from now and someone announces the successful construction
of a large quantum computer. The New York Times runs a front- page article reporting that all
of the public-key algorithms used to protect the Internet have been broken. Users panic.




IEEE PAPER UNITED STATES