Résumé en français
This commit is contained in:
@ -2,7 +2,7 @@ In the last fifty years, the use of cryptography has shifted from military and c
|
||||
For instance, the Enigma machine had a design for military purposes, and another one for companies (Enigma A26).
|
||||
As of today, about $60\%$ of the first million most visited websites propose encrypted and authenticated communications (via \texttt{https}), and so are most of the communications channels used by electronic devices (like \textit{Wifi Protected Access}).
|
||||
|
||||
At the same time, the growth of exchanged data and the sensitivity of transferred information make the urge of procecting these data efficiently even more critical.
|
||||
At the same time, the growth of exchanged data and the sensitivity of transferred information make the urge of protecting these data efficiently even more critical.
|
||||
While we are reaching the Moore's law barrier, other threats exist against nowadays' cryptosystems.
|
||||
For instance, the existence of a quantum computer with sufficient memory~\cite{Sho99} would break most of real-world cryptographic designs, which mostly rely on modular arithmetic assumptions.
|
||||
In this context, it is crucial to design cryptographic schemes that are believed to be quantum-resistant.
|
||||
|
Reference in New Issue
Block a user