On Sat, Sep 7, 2013 at 1:01 PM, Ray Dillinger <b...@sonic.net> wrote:
> And IIRC, pretty much every asymmetric ciphersuite (including all public- > key crypto) is vulnerable to some transformation of Shor's algorithm that > is in fact practical to implement on such a machine. Lattice-based (NTRU) or code-based (McEliece/McBits) public key systems are still considered "post-quantum" algorithms. There are no presently known quantum algorithms that work against these sorts of systems. See http://pqcrypto.org/ -- Tony Arcieri
_______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography