![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Quantum Resistant Cryptography – A Perspective on its Impact in Security
Subscribe/Renew Journal
The thoughts responsible for reliable outcomes in the quantum world are superposition (which can be multiple states at the same time), entanglement (particles are connected by traditional potential energies), and quantum uncertainty (observe the properties of particles). Will lower the quantum dots). Observe other possibilities). In this article, we will discuss the public key cryptographic algorithms considered to resist attacks based on quantum computing and the problems that must be solved using post quantum cryptography. The purpose of this review is to focus on the basic ideas and mechanisms of crypto systems, secure communications, various post quantum cryptographic algorithms, and their implementation aspects.
Keywords
Cryptography, Quantum Cryptography, Public Key Cryptography, Post Quantum Cryptography Algorithm.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 275
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 1