Abstract
This research explores the emerging threat of quantum computing to current cryptographic systems used in telecommunications, and evaluates post-quantum cryptographic algorithms for securing future telecom infrastructure.
Document
Quantum Computing Threats
Post-Quantum Cryptography
Lattice-Based Cryptography
Code-Based Cryptography
Quantum Key Distribution
Migration Strategies
Related Videos
Document Information
- Type: Research Paper
- Date: 2024-03-15
- Source: Quantum Security Institute
- Category: Quantum Security
- File: Quantum-Telecom-Security.pdf
Dr. Robert Chen
Quantum Security Institute
Quantum Cryptography ResearcherProf. Sarah Williams
MIT Quantum Computing
Quantum Security Expert