Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • NEWS

Are quantum computers about to break online privacy?

Access options

Rent or buy this article

Prices vary by article type

from$1.95

to$39.95

Prices may be subject to local taxes which are calculated during checkout

Nature 613, 221-222 (2023)

doi: https://doi.org/10.1038/d41586-023-00017-0

References

  1. Yan, B. et al. Preprint at https://arxiv.org/abs/2212.12372 (2022).

  2. Shor, P. W. Phys. Rev. A 52, R2493–R2496 (1995).

    Article  Google Scholar 

  3. Bernstein, D. J., Biasse, J.-F. & Mosca, M. in Post-Quantum Cryptography Vol. 10346 (eds Lange, T. & Takagi, T.) 330–346 (Springer, 2017).

    Google Scholar 

Download references

Subjects

Latest on:

Nature Careers

Jobs

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing

Search

Quick links