Abstract
This chapter gives a short introduction into the field of cryptography. After defining the protection goals of cryptography, we briefly describe the main cryptographic primitives used to achieve these goals. We describe why the currently used public key cryptosystems become insecure in the presence of quantum computers and thereby motivate the field of post-quantum cryptography. We discuss current research activities in this field and introduce the main families of post-quantum cryptosystems.
Original language | English |
---|---|
Pages (from-to) | 1-5 |
Number of pages | 5 |
Journal | Advances in Information Security |
Volume | 80 |
DOIs | |
Publication status | Published - 2020 |
Externally published | Yes |
Fingerprint
Dive into the research topics of 'Introduction'. Together they form a unique fingerprint.Cite this
Ding, J., Petzoldt, A., & Schmidt, D. S. (2020). Introduction. Advances in Information Security, 80, 1-5. https://doi.org/10.1007/978-1-0716-0987-3_1