Isogeny-gebaseerde toolbox voor post-kwantumcryptografie KU Leuven
A quantum computer exploits quantum-mechanical effects such as superposition to solve hard mathematical problems that are intractable on classical computers. The most prominent example is Shor's algorithm that renders all widely deployed cryptographic systems such as included in TLS totally insecure, and thus also all digital services that crucially rely on them.
Post-quantum cryptography deals with the design and analysis of ...