Post-Quantum Migration of the Tor Application
The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt later attack in the near future. This disserta...
Saved in:
| Main Authors: | Denis Berger, Mouad Lemoudden, William J. Buchanan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-04-01
|
| Series: | Journal of Cybersecurity and Privacy |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2624-800X/5/2/13 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Comparative study of anonymous network Tor and I2P
by: Yun YANG, et al.
Published: (2019-02-01) -
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
by: Haiyue Dong, et al.
Published: (2024-12-01) -
Migrating Software Systems Toward Post-Quantum Cryptography-A Systematic Literature Review
by: Christian Nather, et al.
Published: (2024-01-01) -
Post-Quantum Cryptography in Satellite Internet: Applications and Reflections
by: HUANG Boxue, et al.
Published: (2025-03-01) -
A Hybrid Key Generator Model Based on Multiscale Prime Sieve and Quantum-Inspired Approaches
by: Gerardo Iovane, et al.
Published: (2025-07-01)