SE 4C03 Winter 2004

نویسندگان

  • David Sasaki
  • Ron Rivest
  • Adi Shamir
چکیده

Imagine being able to break any classical encryption algorithm in a matter of seconds. Some would say that this statement is impossible, and it is in a classical sense. But with the advent of quantum computational theory, new methods of computation and algorithms are being developed that are making this statement more realistic. Quantum computation threatens classical encryption algorithms as it introduces unparalleled computational time savings via quantum parallelism.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SE 4C03 Winter 2004

Ensuring that p and q are very large prime numbers ensures the security of the system. Although multiplying large prime numbers is equivalent to multiplying any two large numbers, a trivial operation on a computer, its inverse is practically impossible. This operation is thus called a one-way function. This ensures that although one is given n, the product of the two prime numbers, discovering ...

متن کامل

SE 4C03 Winter 2004 High Speed Wireless Networking

Wireless networking “refers to technology that enables two or more computers to communicate using standard network protocols, but without network cabling [1].” Such networks are defined by IEEE 802.11 standards and are often called wireless LANs. These networks generally operate in one of two ways: ad-hoc communication (see Figure 1) or access point communication (see Figure 2) [2]. In ad-hoc m...

متن کامل

SE 4C03 Winter 2005

The common trend in the new century has been for wireless computer networks to replace wired ones, due to increased mobility and greater convenience. Since the wireless network is simply broadcasting a signal, which anyone can connect to this Wireless Local Area Network (WLAN) and receive the signal with the proper equipment. Thus, these types of networks are fundamentally less secure than the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004