Properties (55)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Security
|
gptkbp:addresses |
Quantum_Computing_Threats
|
gptkbp:aimsTo |
Digital_Communications
|
gptkbp:fieldOfStudy |
Computer Science
|
gptkbp:has_a_focus_on |
Government Agencies
Research Grants Industry Collaborations Innovation Hubs Academic_Research |
https://www.w3.org/2000/01/rdf-schema#label |
Post-Quantum Security
|
gptkbp:includes |
Quantum-resistant_Algorithms
|
gptkbp:influenced |
Emerging Technologies
Advancements_in_Quantum_Computing |
gptkbp:involves |
Lattice-based Cryptography
Code-based Cryptography Hash-based_Signatures |
gptkbp:is_a_place_for |
Existing Protocols
Legacy_Systems |
gptkbp:is_a_route_for |
Secure Data Storage
Secure Transactions Secure Cloud Computing Future-proofing Systems |
gptkbp:is_a_subject_of |
Workshops
Technical Reports Public Discourse International_Conferences |
gptkbp:is_a_symbol_of |
Real-world Applications
|
gptkbp:is_essential_for |
Data Integrity
Data Protection Tech Companies IoT Security National_Security |
gptkbp:is_evaluated_by |
NIST
|
gptkbp:is_part_of |
Risk Management
Cybersecurity Strategy Cyber Defense Strategies Digital_Security_Frameworks |
gptkbp:is_recognized_for |
Secure Messaging Apps
|
gptkbp:is_studied_in |
Cryptographers
|
gptkbp:is_used_in |
Policy Papers
Academic_Journals |
gptkbp:issues |
Cryptography
E-commerce Telecommunications Financial Institutions Privacy Advocates |
gptkbp:related_to |
gptkb:Public_Key_Infrastructure
gptkb:Post-Quantum_Cryptography Blockchain Technology Encryption Techniques Secure Software Development |
gptkbp:requires |
New Standards
|
gptkbp:standardFeatures |
gptkb:ISO
|
gptkbp:was_a_response_to |
gptkb:Shor's_Algorithm
Advancements_in_Quantum_Algorithms |