Post-quantum cryptography for long-term security KU Leuven
Online banking, e-commerce, telemedicine, mobile communication, and cloud computing depend fundamentally on the security of the underlying cryptographic algorithms. Public-key algorithms are particularly crucial since they provide digital signatures and establish secure communication without requiring in-person meetings.
Essentially all applications today are based on RSA or on the discrete-logarithm problem in finite fields or on ...