Page 10

PQC_for_Dummies

10 Introduction Foolish Assumptions We assume that you are somewhat familiar with cryptography in general, e.g., you know the difference between symmetric and asymmetric keys. Maybe you already use cryptography, or you even have an HSM deployed in your organization. We furthermore assume that you are interested in current trends in cryptography. Icons Used in This Book The Technical Stuff icon marks information that is not necessarily needed but gives you a deeper understanding of how exactly, for example, the mentioned algorithms work (formulas and all). This icon marks information that is especially important to know and worth remembering. This Warning icon points out concerns to consider now or in the near future for your own data security. Attention! This icon marks cases that need to be handled with caution. The Tip icon marks tips and helpful suggestions when looking at securing your own data. Beyond This Book After having read this book you will have a good overview of the current state of affairs in post-quantum cryptography. If you have open questions concerning the impact of quantum computers and on post-quantum cryptography, you can find


PQC_for_Dummies
To see the actual publication please follow the link above