Post-Quantum Migration of the Tor Application

The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt later attack in the near future. This disserta...

Full description

Saved in:
Bibliographic Details
Main Authors: Denis Berger, Mouad Lemoudden, William J. Buchanan
Format: Article
Language:English
Published: MDPI AG 2025-04-01
Series:Journal of Cybersecurity and Privacy
Subjects:
Online Access:https://www.mdpi.com/2624-800X/5/2/13
Tags: Add Tag
No Tags, Be the first to tag this record!