On Sat, Sep 7, 2013 at 1:01 PM, Ray Dillinger <b...@sonic.net> wrote:

> And IIRC, pretty much every asymmetric ciphersuite (including all public-
> key crypto) is vulnerable to some transformation of Shor's algorithm that
> is in fact practical to implement on such a machine.

Lattice-based (NTRU) or code-based (McEliece/McBits) public key systems are
still considered "post-quantum" algorithms. There are no presently known
quantum algorithms that work against these sorts of systems.

See http://pqcrypto.org/

Tony Arcieri
The cryptography mailing list

Reply via email to