Skip to Content
Quantum Computing Fundamentals
book

Quantum Computing Fundamentals

by Chuck Easttom
June 2021
Beginner content levelBeginner
384 pages
10h 9m
English
Addison-Wesley Professional
Content preview from Quantum Computing Fundamentals

Chapter 15

Other Approaches to Quantum Resistant Cryptography

Chapter Objectives

After reading this chapter and completing the review questions, you will be able to do the following:

  • Understand the basis for hash-based cryptographic algorithms

  • Demonstrate a working knowledge of code-based cryptography

  • Explain the concepts of supersingular isogeny key exchange

  • Comprehend the details of a few exemplary algorithms

Chapter 13, “Lattice-based Cryptography,” and Chapter 14, “Multivariate Cryptography,” introduced you to various types of cryptographic algorithms that have been posited as quantum resistant. This chapter presents you with an assortment of cryptographic algorithms that do not fit neatly into one of those two categories.

15.1 Hash Functions ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Quantum Computing Fundamentals

Quantum Computing Fundamentals

Chuck Easttom
Quantum Computing For Dummies

Quantum Computing For Dummies

whurley, Floyd Earl Smith

Publisher Resources

ISBN: 9780136793830