Skip to main content

Questions tagged [quantum-computing]

A computation model which relies on quantum-mechanic phenomena, such as entanglement and superposition. This generalizes the probabilistic model of computation.

5 votes
1 answer
246 views

Craig Gidney's recent preprint How to factor 2048 bit RSA integers with less than a million noisy qubits has this graph Figure 2: Pareto frontiers achieved by this paper for the Toffoli and logical ...
fgrieu's user avatar
  • 151k
2 votes
0 answers
107 views

I was studying the paper "One Shot Signatures and Applications to Hybrid Quantum/Classical Authentication." In it, the authors define "equivocal hashing" and provide a construction ...
woah's user avatar
  • 89
-1 votes
1 answer
127 views

While I have read a number of articles/papers etc on Quantum, I wonder if the only answer is 10 or if 3 or 5 will be a practical way forward as an interim measure? While most advocate a transition ...
Dayle's user avatar
  • 1
0 votes
1 answer
153 views

Hashcash is a mechanism to prove that the sender of a message is really intending to send that message instead of just performing a denial of service attack. It makes denial of service attacks harder ...
juhist's user avatar
  • 1,643
3 votes
0 answers
145 views

I hope this is not off-topic for this SE, as it directly relates to the RSA problem. My background is in quantum information and computation, so please excuse me if my notation doesn't match your ...
Amirhossein Rezaei's user avatar
3 votes
2 answers
1k views

I don't understand why discrete logarithm is not quantum proof. I understand that quantum computer can quickly compute the exponent, but there is a modulo in the equation. Doesn't it mean, that there ...
pepa z depa's user avatar
4 votes
0 answers
142 views

Take an elliptic curve group of 256-bit prime order $n$ over a 256-bit prime field in which the Discrete Logarithm Problem is believed hard, e.g. secp256r1. Build an isomorphic Schnorr group by taking ...
fgrieu's user avatar
  • 151k
11 votes
4 answers
8k views

I wonder how the world will come to know that scalable, fully fault-tolerant quantum computers capable of running Shor's algorithm have arrived. The day when this happens has been referred to as "...
Mark S's user avatar
  • 288
0 votes
2 answers
2k views

By full alternatives I mean things that can do everything RSA can, namely establish secure security without privately sharing information prior. Something which AES can't do. In other words, I'm ...
blademan9999's user avatar
2 votes
1 answer
553 views

Experts suggested 3DES when AES wasn't developed yet, since meet-in-the-middle attack, they suggested triple DES. Grover's algorithm, a quantum algorithm, weakens symmetric encryptions, how about ...
Flan1335's user avatar
  • 391
6 votes
3 answers
12k views

Im trying to learn more about cryptography and ran into a post, Is AES-128 quantum safe?, which asks if AES-128 is safe. From the articles and replies it seems that AES-128 (symmetric key) is safe ...
cryptoman534345's user avatar
1 vote
0 answers
73 views

Is PoA persistent against quantum attacks? If not, How can we make it post quantum? I mean the PoA used with blockchains that delivers comparatively fast transactions through a consensus mechanism ...
Alireza's user avatar
  • 109
0 votes
1 answer
249 views

Grover, a quantum algorithm, weakens AES and ChaCha20. Is it possible to use multiple symmetric keys to encrypt a message multiple times to achieve 256-bit security for quantum computers?
Flan1335's user avatar
  • 391
4 votes
1 answer
206 views

Consider a Schnorr group with order a prime $q$ sized for security against current computers (like $q$ of 256 bit); modulus a prime $p=q\,r+1$ large enough (e.g. 3072 to 32768-bit) that the algorithms ...
fgrieu's user avatar
  • 151k
0 votes
1 answer
364 views

Does this research also work for breaking bitcoin ECDSA? If so, how many qubit will be needed for 256-bit elliptic curve key?
user avatar

15 30 50 per page