University of Alabama in Huntsville

Displaying 1-1 of 1 results

  • White Papers // Sep 2009

    Authentication Protocol Using Quantum Superposition States

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to...

    Provided By University of Alabama in Huntsville

  • White Papers // Sep 2009

    Authentication Protocol Using Quantum Superposition States

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to...

    Provided By University of Alabama in Huntsville