Abstract
There is a new technology on the horizon that will forever change the information security and privacy industry landscape. Quantum computing, together with quantum communication, will have many beneficial applications but will also be capable of breaking many of today's most popular cryptographic techniques that help ensure data protection?in particular, confidentiality and integrity of sensitive information. These techniques are ubiquitously embedded in today's digital fabric and implemented by many industries such as finance, health care, utilities, and the broader information communication technology (ICT) community. It is therefore imperative for ICT executives to prepare for the transition from quantum-vulnerable to quantum-resistant technologies.
Publisher
Association for Computing Machinery (ACM)
Reference35 articles.
1. Getting Ready for Post-Quantum Cryptography:
2. Hybrid quantum-classical approach to correlated materials;Bauer B.;Physical Review,2016
3. Introduction to post-quantum cryptography
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. PMMP-PQC Migration Management Process✱;European Interdisciplinary Cybersecurity Conference;2024-06-05
2. Counter-Offset mode: A new paradigm in resisting differential cryptanalysis;Trends in Computer Science and Information Technology;2024-03-30
3. Enhancing cryptographic robustness with dual key chaining;Trends in Computer Science and Information Technology;2024-03-14
4. Reviewing Crypto-Agility and Quantum Resistance in the Light of Agile Practices;Agile Processes in Software Engineering and Extreme Programming – Workshops;2023-12-28
5. Artificial Intelligence for Cyber Security;Automated Secure Computing for Next‐Generation Systems;2023-11-16