Quantum and Cryptography

TheDigitalArtist / Pixabay

The two databases that I have chosen to use for this assignment are Computer Source and Faulkner’s Advisory for IT Studies. My main focus will be on how quantum computing will potentially effect cryptology as it progresses. The information found should give me a great head start on gathering the information that is required.
 
Computer Source
Cryptography and Quantum Computing (80 results)
Encryption and Quantum Computing (30 results)
Cyber Security and Quantum (15 results)
 
Faulkner’s Advisory for IT Studies
Cryptography and Quantum Computing (110 results)
Encryption and Quantum Computing (43 results)
Cyber Security and Quantum (34 results)
 
Potential Useful Sources
 
Cryptography and Quantum Computing- Computer Source
Gavinksy et al. (2009, January). Exponential Separation for One-Way Quantum Communication Complexity, with Applications to Cryptography. SIAM Journal on Computing, 1695-1708. http://epubs.siam.org/doi/10.1137.070706550
Gheorghiu et al. (2019, May). Verification of Quantum Computation: An Overview of Existing Approaches. Theory of Computing Systems, 715-808. http://link.springer.com/10.1007/s00224-018-9872-3
 
Cryptography and Quantum Computing- Faulkner’s Advisory for IT Studies
Nejatollahi et al. (2019, February 27). Post-Quantum Lattice-Based Cryptography Implementations. ACM Computing, 1-41. https://dl.acm.org/doi/10.1145/3292548
Regev, Oded. (2004, November). New Lattice-Based Cryptographic Constructions. Journal of the ACM, 899-942. https://dl.acm.org/doi/10.1145/1039488.1039490

0 thoughts on “Quantum and Cryptography

  1. Good day Samuel. I thought you utilized all items in your advanced searching per the instructions. I honestly had a bit of trouble following the instructions but it’s good to see your post week after week keep improving. Those are excellent database choices. I actually looked them up. As always I thought you did a wonderful job with this post Sir. I can’t wait to read your finally research paper.

  2. Computer Source is an effective way to narrow your search and confine your results to find articles that focus on your topic. I have not used Faulkner’s Advisory for IT Studies, so I’m glad to learn of another source for my research. With hundreds of articles on cybersecurity with quantum computers, it is evident that this issue must be adding significant pressure to security analysts as we look ahead to new challenges. I imagine your work with the Air Force has given you some insight into the security threats that can be crafted by quantum computers. Any work experiences that relate to your topic (without, of course, revealing classified information) would make your project report more impactful. I wish you success!

Leave a Reply

Your email address will not be published. Required fields are marked *