Page 75 - Cyber Warnings
P. 75







Works Cited

Bell, J.S. “On the Einstein Podolsky Rosen Paradox”, Physics, 1, 195-200 (1964)

Bernstein, Daniel J. Buchmann, Johannes. “Post-Quantum Cryptography”, Springer-Verlag
Berlin Heidelberg. (2009)

Gleason, A.M. “Measures on the closed subspaces of a Hilbert space”, Journal of Mathematics
and Mechanics, Indiana Univ. Math. J. 6 No. 4 (1957), 885–893

Held, Carsten. “The Kochen-Specker Theorem”, The Stanford Encyclopedia of Philosophy (Fall
2016 Edition), Edward N. Zalta (ed.)

Kochen, Simon. Specker, Ernst. “The problem of hidden variables in quantum mechanics”,
Journal of Mathematics and Mechanics 17, 59–87 (1967)

McEliece, R.J. “A Public-Key Cryptosystem Based On Algebraic Coding Theory”, DSN Progress
Report 42-44. (1978), 144-116


Moorhouse, G. Eric. “Shor’s Algorithm for Factorizing Large Integers”, University of Wyoming
(2002)

“Public Key Cryptography”, IBM Knowledge Center. Version 1.1.0.1.4

Rouse, Margaret. “Asymmetric Cryptography (Public Key Cryptography)”,
Searchsecurity.techtarget.com. (2016)

Rouse, Margaret. “Encryption”, Searchsecurity.techtarget.com. (2014)

“Symmetric Cryptography”, IBM Knowledge Center. Version 1.1.0.1.4

Wang, Yongge. “Quantum Resistant Random Linear Code Based Public Key Encryption
Scheme (RLCE)”, Information Theory (ISIT), 2016 IEEE International Symposium.
(2016)



About The Author

My name is Hunter Bannister. I’m a student at East Carolina University in the
College of Engineering and Technology. My major is information and computer
technology with a concentration in security set to graduate December of 2017. I
have experience in areas of networking like Red Hat Enterprise Linux, Cisco
IOS, and Microsoft server but have always been interested in quantum
computers and physics. So I merged both of areas of interest and discovered a
lot about where information security will be headed in the future due to the
development of quantum computers.

If you would like to contact me I can be reached through email at [email protected].

75 Cyber Warnings E-Magazine – June 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   70   71   72   73   74   75   76   77   78   79   80