Naturally, my own interest in writing these notes stems from my experience in quantum computing and quantum networking. The previous sections dealt primarily with classical attacks, with a little bit of quantum networking can be integrated with classical thrown into each section. Here, let's look at the attacks on classical cryptography using quantum computers.
No comments:
Post a Comment