On Sat, Sep 7, 2013 at 1:01 PM, Ray Dillinger <b...@sonic.net> wrote:

> And IIRC, pretty much every asymmetric ciphersuite (including all public-
> key crypto) is vulnerable to some transformation of Shor's algorithm that
> is in fact practical to implement on such a machine.


Lattice-based (NTRU) or code-based (McEliece/McBits) public key systems are
still considered "post-quantum" algorithms. There are no presently known
quantum algorithms that work against these sorts of systems.

See http://pqcrypto.org/

-- 
Tony Arcieri
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to