{"title":"5 个问题:斯科特-贝斯特:让今天的系统为明天的后量子密码学做好准备","authors":"Rahul Rao","doi":"10.1109/MSPEC.2024.10589686","DOIUrl":null,"url":null,"abstract":"Today's cryptographic protocols rely on mathematical techniques like finding the prime factors of very large numbers. But large enough quantum computers would have a powerful tool called Shor's algorithm, which can quickly factor colossal integers.","PeriodicalId":13249,"journal":{"name":"IEEE Spectrum","volume":"61 7","pages":"21-21"},"PeriodicalIF":2.6000,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10589686","citationCount":"0","resultStr":"{\"title\":\"5 Questions: Scott Best: Prepping Today's Systems for Tomorrow's Post-Quantum Cryptography\",\"authors\":\"Rahul Rao\",\"doi\":\"10.1109/MSPEC.2024.10589686\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today's cryptographic protocols rely on mathematical techniques like finding the prime factors of very large numbers. But large enough quantum computers would have a powerful tool called Shor's algorithm, which can quickly factor colossal integers.\",\"PeriodicalId\":13249,\"journal\":{\"name\":\"IEEE Spectrum\",\"volume\":\"61 7\",\"pages\":\"21-21\"},\"PeriodicalIF\":2.6000,\"publicationDate\":\"2024-07-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10589686\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Spectrum\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10589686/\",\"RegionNum\":4,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Spectrum","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10589686/","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
5 Questions: Scott Best: Prepping Today's Systems for Tomorrow's Post-Quantum Cryptography
Today's cryptographic protocols rely on mathematical techniques like finding the prime factors of very large numbers. But large enough quantum computers would have a powerful tool called Shor's algorithm, which can quickly factor colossal integers.
期刊介绍:
IEEE Spectrum Magazine, the flagship publication of the IEEE, explores the development, applications and implications of new technologies. It anticipates trends in engineering, science, and technology, and provides a forum for understanding, discussion and leadership in these areas.
IEEE Spectrum is the world''s leading engineering and scientific magazine. Read by over 300,000 engineers worldwide, Spectrum provides international coverage of all technical issues and advances in computers, communications, and electronics. Written in clear, concise language for the non-specialist, Spectrum''s high editorial standards and worldwide resources ensure technical accuracy and state-of-the-art relevance.