Page 75 - Cyber Warnings
P. 75
Works Cited
Bell, J.S. “On the Einstein Podolsky Rosen Paradox”, Physics, 1, 195-200 (1964)
Bernstein, Daniel J. Buchmann, Johannes. “Post-Quantum Cryptography”, Springer-Verlag
Berlin Heidelberg. (2009)
Gleason, A.M. “Measures on the closed subspaces of a Hilbert space”, Journal of Mathematics
and Mechanics, Indiana Univ. Math. J. 6 No. 4 (1957), 885–893
Held, Carsten. “The Kochen-Specker Theorem”, The Stanford Encyclopedia of Philosophy (Fall
2016 Edition), Edward N. Zalta (ed.)
Kochen, Simon. Specker, Ernst. “The problem of hidden variables in quantum mechanics”,
Journal of Mathematics and Mechanics 17, 59–87 (1967)
McEliece, R.J. “A Public-Key Cryptosystem Based On Algebraic Coding Theory”, DSN Progress
Report 42-44. (1978), 144-116
Moorhouse, G. Eric. “Shor’s Algorithm for Factorizing Large Integers”, University of Wyoming
(2002)
“Public Key Cryptography”, IBM Knowledge Center. Version 1.1.0.1.4
Rouse, Margaret. “Asymmetric Cryptography (Public Key Cryptography)”,
Searchsecurity.techtarget.com. (2016)
Rouse, Margaret. “Encryption”, Searchsecurity.techtarget.com. (2014)
“Symmetric Cryptography”, IBM Knowledge Center. Version 1.1.0.1.4
Wang, Yongge. “Quantum Resistant Random Linear Code Based Public Key Encryption
Scheme (RLCE)”, Information Theory (ISIT), 2016 IEEE International Symposium.
(2016)
About The Author
My name is Hunter Bannister. I’m a student at East Carolina University in the
College of Engineering and Technology. My major is information and computer
technology with a concentration in security set to graduate December of 2017. I
have experience in areas of networking like Red Hat Enterprise Linux, Cisco
IOS, and Microsoft server but have always been interested in quantum
computers and physics. So I merged both of areas of interest and discovered a
lot about where information security will be headed in the future due to the
development of quantum computers.
If you would like to contact me I can be reached through email at [email protected].
75 Cyber Warnings E-Magazine – June 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide