Chapter 6

*Modern Cryptography – Current Challenges and Solutions*

Communications of the ACM.

[30] Ren J-G et al. Ground-to-satellite quantum teleportation. Nature.

[31] Quantum Algorithm Zoo. Details about the Quantum algorithm Zoo, by Stephen Jordan. Available from: https://

math.nist.gov/quantum/zoo/

1979;**22**(11):612-613

1999;**41**(2):303-332

[32] Building quantum computers designed to scale published in QCI at: https://www.quantumcircuits.com

[33] Shamir A. How to share a secret. Communications of the ACM.

[34] Shannon C. Communication theory of secrecy systems. Bell System Technical Journal. 1949;**28**(4):656-715

[35] Shor WP. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review.

ac.uk/physics/iqt/index.html

trusticodigicert symantec spat/

[38] Zomorodi-Moghadam M, Houshmand M, Houshmand M. Optimizing teleportation cost in distributed quantum circuits. International Journal of Theoretical

Physics. 2018;**57**(3):848-861

[39] Zych MD. Quantum safe

cryptography based on hash functions: A survey [master's thesis]. Department of Informatics, University of Oslo. 2018

[36] Available from: http://www.sussex.

[37] 23,000 HTTPS certs will be axed in next 24 hours after private keys leakTrustico, DigiCert come to blows as browsers prepare to snub Symantec-brand SSL by, By John Leyden 1 Mar 2018. Available from: https://www.theregister.co.uk/2018/03/01/

1978;**21**(2):120-126

2017;**549**:70-73

[19] 2018 CES: Intel advances quantum and neuromorphic computing research. 2018. Available from: https://newsroom.

[20] A true quantum leap. Introducing the first commercial trapped ion quantum computer. Available from:

[21] Lamport L. Constructing digital signatures from a one-way function. Technical Report SRI-CSL-98. SRI International Computer Science

[22] Liao SK, Cai WQ, et al. Satelliteto-ground quantum key distribution.

[23] Merkle R. Secure communications

[25] Perlner RA, Cooper DA. Quantum resistant public key cryptography: A survey. ID Trust. 2009. pp. 85-93

[26] Post-quantum cryptography. Available from: https://en.wikipedia. org/wiki/Post-quantum.cryptography

[27] Information about Post-quantum cryptography. Available from: https://

Technical Publications. Available from:

[29] Rivest RL, Shamir A, Adelman L. A method for obtaining digital signatures

[28] QPU Specifications. Rigetti

https://www.rigetti.com/qpu

and public-key cryptosystems.

[24] Niederhagen R, Waidner M. Practical post-quantum cryptography. White Paper, Fraunhofer Institute for Secure Information Technology SIT.

intel.com/news/intel-advancesquantum-neuromorphic-computing-

research/#gs.9ud403

https://ionq.co

Laboratory. 1979

Nature. 2017;**549**:43-47

over insecure channels. Communications of the ACM.

1978;**21**(4):294-299

August 18, 2017

pqcrypto.org

**84**
