Skip to main content
3 Total Results
Since Peter Shor published his eponymous algorithm for factoring composite numbers in 1994, cryptographic experts have speculated over whether and when the quantum computer needed to execute his algorithm on numbers of the size used in present-day public-key cryptosystems would become a reality.  If...
As part of Entrust's ongoing celebration of our 20th Anniversary of Public Key Infrastructure (PKI), we're looking back in a four-part series on the pioneers, processes and events that have shaped this ever-evolving technology.  In the first three parts, we traced the early history of PKI and hig...