Using Coding Techniques for Attacking Post-Quantum Cryptographic Assumptions and Systems
Post-quantum cryptography for resisting possible attacks from malicious quantum adversaries has become one of the key topics in recent cryptographic research. Its ultimate goal is to search for efficient and secure primitives replacing the factoring- and discrete log-based schemes in service that will be broken in polynomial time by Shor’s algorithm. It is now an urgent task to complete this repla