
量子密码竞赛产生下一代标准算法
Quantum Cryptography Competition Yields Next-Generation Standard Algorithms
[1] |
Castelvecchi D. These ‘quantum-proof’ algorithms could safeguard against future cyberattacks [Internet]. London: Nature; 2022 Jul 11; [cited 2022 Oct 30]. Available from: https://www.nature.com/articles/d41586-022-01879-6.
|
[2] |
Boutin C. NIST asks public to help future-proof electronic information [Internet]. Gaithersburg: NIST; 2016 Dec 20 [cited 2022 Oct 30]. Available from: https://www.nist.gov/news-events/news/2016/12/nist-asks-publichelp-future-proof-electronic-information.
|
[3] |
Palmer C. Google takes a big step toward quantum computing. Engineering 2020;6(4):381–3.
|
[4] |
Palmer C. Quantum computing quickly scores second claim of supremacy. Engineering 2021;7(9):1199–200.
|
[5] |
Shor PW. Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science; 1994 Nov 20–22; Santa Fe, NM, USA. New York: IEEE; 1994. p. 124–34.
|
[6] |
Vandersypen LMK, Steffen M, Breyta G, Yannoni CS, Sherwood MH, Chuang IL. Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance. Nature 2001;414(6866):883–7.
|
[7] |
O’Shea D. NIST picks initial post-quantum security standards [Internet]. New York: Fierce Electronics; 2022 Jul 7 [cited 2022 Oct 30]. Available from: https:// www.fierceelectronics.com/electronics/nist-picks-initial-post-quantum-securitystandards.
|
[8] |
Venables P. How Google is preparing for a post-quantum world [Internet]. Mountain View: Google; 2022 Jul 6 [cited 2022 Oct 30]. Available from: https://cloud.google.com/blog/products/identity-security/how-googleis-preparing-for-a-post-quantum-world.
|
[9] |
Smith DI. Data is vulnerable to quantum computers that don’t exist yet [Internet]. New York: IEEE Spectrum; [cited 2022 Oct 30]. Available from: https://spectrum.ieee.org/post-quantum-cryptography.
|
[10] |
Westerbaan B, Rubin CD. Defending against future threats: Cloudflare goes post-quantum [Internet]. San Francisco: Cloudflare; 2022 Oct 3 [cited 2022 Oct 30]. Available from: https://blog.cloudflare.com/post-quantumfor-all/.
|
[11] |
Carlson EK. New standards release sets stage for 5G future. Engineering 2021;7 (3):275–6.
|
[12] |
Leslie M. Legacy information technology compounds pandemic pain. Engineering 2021;7(4):415–7.
|
[13] |
Grimes RA. All you need to know about the move from SHA-1 to SHA-2 encryption [Internet]. Needham: CSO; 2017 Jul 6 [cited 2022 Oct 30]. Available from: https://www.csoonline.com/article/2879073/all-you-need-to-knowabout-the-move-from-sha1-to-sha2-encryption.html.
|
[14] |
Lomas N. Security researchers announce ‘‘first practical” SHA-1 collision attack [Internet]. San Francisco: TechCrunch; 2017 Feb 23 [cited 2022 Oct 30]. Available from: https://techcrunch.com/2017/02/23/security-researchersannounce-first-practical-sha-1-collision-attack/.
|
[15] |
Liu N. China, Russia to adopt ‘slightly different’ PQC standards from US [Internet]. Denver: SDX Central; 2022 Oct 19 [cited 2022 Oct 30]. Available from: https://www.sdxcentral.com/articles/analysis/china-russia-to-adoptslightly-different-pqc-standards-from-us/2022/10/.
|
[16] |
Whalen J. Chicago scientists are testing an unhackable quantum internet in their basement closet [Internet]. Washington, DC: Washington Post; 2022 Oct 9 [cited 2022 Oct 30]. Available from: https://www.washingtonpost.com/ technology/2022/10/09/quantum-internet-chicago-argonne/.
|
[17] |
Leslie M. Quantum cryptography via satellite. Engineering 2019;5(3):353–434.
|
[18] |
Ropek L. Supposedly quantum-proof encryption cracked by basic-ass PC [Internet]. New York: Gizmodo; 2022 Aug 2 [cited 2022 Nov 13]. Available from: https://gizmodo.com/quantum-encryption-algorithm-nist-brokensingle-core-pc-1849360898.
|
[19] |
Post-quantum cryptography: digital signature schemes. Gaithersburg: NIST; 2022 Aug 29 [cited 2022 Nov 16]. Available from: https://csrc.nist.gov/ Projects/pqc-dig-sig/standardization.
|
/
〈 |
|
〉 |