Your Computer is Leaking

نویسندگان

  • Dennis Hollenbeck
  • Ian Malloy
چکیده

This presentation focuses on differences between quantum computing and quantum cryptography. Both are discussed related to classical computer systems in terms of vulnerability. Research concerning quantum cryptography is analyzed in terms of work done by the University of Cambridge in partnership with a division of Toshiba, and also attacks demonstrated by Swedish researchers against QKD of energy-time entangled systems. Quantum computing is covered in terms of classical cryptography related to weaknesses presented by Shor's algorithm. Previous classical vulnerabilities also discussed were conducted by Israeli researchers as a side-channel attack using parabolic curve microphones, which has since been patched.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A CleanRoom Approach to BYOA: Bring Your Own Apps

In this paper, we present CleanRoom, a new app platform designed to protect confidentiality in a Bring Your Own Apps (BYOA) world in which employees use their own third-party apps to create, edit, and share corporate data. CleanRoom’s core guarantee is privacy-preserving collaboration: CleanRoom enables employees to work together on shared documents while ensuring that the document’s owners—not...

متن کامل

Parallel computing using MPI and OpenMP on self-configured platform, UMZHPC.

Parallel computing is a topic of interest for a broad scientific community since it facilitates many time-consuming algorithms in different application domains.In this paper, we introduce a novel platform for parallel computing by using MPI and OpenMP programming languages based on set of networked PCs. UMZHPC is a free Linux-based parallel computing infrastructure that has been developed to cr...

متن کامل

QEA: A New Systematic and Comprehensive Classification of Query Expansion Approaches

A major problem in information retrieval is the difficulty to define the information needs of user and on the other hand, when user offers your query there is a vast amount of information to retrieval. Different methods , therefore, have been suggested for query expansion which concerned with reconfiguring of query by increasing efficiency and improving the criterion accuracy in the information...

متن کامل

Towards understanding and fixing the leaking pipeline of Computer Science

Introduction The continued underrepresentation of women in the computer science (CS) workforce is a sobering reminder of the shortcomings of the information age. We will study the cause of this phenomenon under the “leaking pipeline” hypothesis which claims that women don’t take up CS careers because they drop out of CS courses in college. We will discuss recent research which demonstrates that...

متن کامل

The Fundamental Reasons Why Laptop Computers should not be Used on Your Lap

As a tendency to use new technologies, gadgets such as laptop computers are becoming more popular among students, teachers, businessmen and office workers. Today laptops are a great tool for education and learning, work and personal multimedia. Millions of men, especially those in the reproductive age, are frequently using their laptop computers on the lap (thigh). Over the past several years, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1609.09157  شماره 

صفحات  -

تاریخ انتشار 2016