Report copyright - Study on EU Information Security Situation - IPA5.4 Application Scenarios 44 5.5 Hardness of the Main Computational Problems Used in Cryptography 45 5.6 Results on Quantum Computing
Please pass captcha verification before submit form