Post-Quantum Migration of the Tor Application

The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt later attack in the near future. This disserta...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Denis Berger, Mouad Lemoudden, William J. Buchanan
Formato: Artículo
Lenguaje:inglés
Publicado: MDPI AG 2025-04-01
Colección:Journal of Cybersecurity and Privacy
Materias:
Acceso en línea:https://www.mdpi.com/2624-800X/5/2/13
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!