174 research outputs found

    Quantum Algorithms for Attacking Hardness Assumptions in Classical and Post‐Quantum Cryptography

    Get PDF
    In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post-quantum secure cryptosystems. The authors provide details on the cost of the quantum algorithms presented in this survey. The authors furthermore discuss ongoing research directions that can impact quantum cryptanalysis in the future

    Acta physica et chemica Tomus XXXV. Fasciculus 1-4.

    Get PDF

    On the Origin of Abstraction : Real and Imaginary Parts of Decidability-Making

    No full text
    International audienceThe behavioral tradition has largely anchored on Simon's early conception of bounded rationality, it is important to engage more explicitly cognitive approaches particularly ones that might link to the issue of identifying novel competitive positions. The purpose of the study is to describe the cognitive processes by which decision-makers manage to work, individually or collectively, through undecidable situations and design innovatively. Most widespread models of rationality developed for preference-making and based on a real dimension should be extended for abstraction-making by adding a visible imaginary one. A development of a core analytical/conceptual apparatus is proposed to purposely account this dual form of reasoning, deductive to prove (then make) equivalence and abstractive to represent (then unmake) it. Complex numbers, comfortable to describe repetitive, expansional and superimposing phenomena (like waves, envelope of waves, interferences or holograms, etc.) appear as generalizable to cognitive processes at work when redesigning a decidable space by abstraction (like relief vision to design a missing depth dimension, Loyd's problem to design a missing degree of freedom, etc.). This theoretical breakthrough may open up vistas capacity in the fields of information systems, knowledge and decision
    corecore