• Shor's algorithm is a quantum algorithm for finding the prime factors of an integer. It was developed in 1994 by the American mathematician Peter Shor...
    40 KB (5,809 words) - 23:45, 1 July 2025
  • quantum algorithms exploit generally cannot be efficiently simulated on classical computers (see Quantum supremacy). The best-known algorithms are Shor's algorithm...
    39 KB (4,580 words) - 18:07, 18 July 2025
  • an algorithm created to run on a quantum computer. In 1994, further progress toward quantum supremacy was made when Peter Shor formulated Shor's algorithm...
    54 KB (5,940 words) - 07:53, 21 July 2025
  • Thumbnail for Peter Shor
    particular for devising Shor's algorithm, a quantum algorithm for factoring exponentially faster than the best currently-known algorithm running on a classical...
    14 KB (1,085 words) - 00:48, 18 March 2025
  • algorithms, such as Shor's algorithm,: 131  the quantum algorithm for linear systems of equations, and the quantum counting algorithm. The algorithm operates...
    14 KB (2,887 words) - 06:19, 25 February 2025
  • Thumbnail for Quantum computing
    classical algorithms. Quantum algorithms that offer more than a polynomial speedup over the best-known classical algorithm include Shor's algorithm for factoring...
    114 KB (12,449 words) - 23:15, 28 July 2025
  • it in polynomial time. Shor's algorithm takes only O(b3) time and O(b) space on b-bit number inputs. In 2001, Shor's algorithm was implemented for the...
    25 KB (2,977 words) - 21:02, 19 June 2025
  • purpose – would be able to factor in polynomial time, breaking RSA; see Shor's algorithm. Finding the large primes p and q is usually done by testing random...
    60 KB (7,807 words) - 07:54, 19 July 2025
  • on Shor's algorithm and Grover's algorithm. Of the two, Shor's offers the greater risk to current security systems. Derivatives of Shor's algorithm are...
    29 KB (3,225 words) - 14:31, 21 June 2025
  • Hidden subgroup problem (category Quantum algorithms)
    it especially important in the theory of quantum computing because Shor's algorithms for factoring and finding discrete logarithms in quantum computing...
    12 KB (2,031 words) - 13:15, 26 March 2025
  • running Shor's algorithm or possibly alternatives. As of 2024, quantum computers lack the processing power to break widely used cryptographic algorithms; however...
    67 KB (6,841 words) - 09:07, 27 July 2025
  • Quantum annealing (category Optimization algorithms and methods)
    universal quantum computer and, in particular, cannot execute Shor's algorithm because Shor's algorithm requires precise gate operations and quantum Fourier transforms...
    33 KB (3,462 words) - 18:19, 18 July 2025
  • Quantum Fourier transform (category Quantum algorithms)
    many quantum algorithms, notably Shor's algorithm for factoring and computing the discrete logarithm, the quantum phase estimation algorithm for estimating...
    20 KB (3,310 words) - 01:54, 27 July 2025
  • computer. The quantum algorithm solving Simon's problem, usually called Simon's algorithm, served as the inspiration for Shor's algorithm. Both problems are...
    17 KB (3,247 words) - 12:46, 24 May 2025
  • popular public-key cryptosystems, it is resistant to attacks using Shor's algorithm. NTRUEncrypt was patented, but it was placed in the public domain in...
    12 KB (1,215 words) - 21:39, 20 April 2025
  • (to break 128 bits of security). In comparison, using Shor's algorithm to break the RSA algorithm requires 4098 qubits and 5.2 trillion Toffoli gates for...
    39 KB (4,677 words) - 07:29, 27 June 2025
  • taken by Grover's algorithm. Amplitude amplification Brassard–Høyer–Tapp algorithm (for solving the collision problem) Shor's algorithm (for factorization)...
    31 KB (4,708 words) - 10:49, 17 July 2025
  • Thumbnail for Prime number
    general-purpose algorithm is RSA-240, which has 240 decimal digits (795 bits) and is the product of two large primes. Shor's algorithm can factor any integer...
    117 KB (14,179 words) - 23:31, 23 June 2025
  • Thumbnail for Quantum engineering
    that could break current cryptography systems using methods such as Shor's algorithm. These methods include quantum key distribution (QKD), a method of...
    22 KB (2,256 words) - 02:56, 27 July 2025
  • algorithm prime factorization algorithm Quadratic sieve Shor's algorithm Special number field sieve Trial division Lenstra–Lenstra–Lovász algorithm (also...
    72 KB (7,951 words) - 17:13, 5 June 2025
  • elliptic-curve cryptosystems—which could, theoretically, be defeated using Shor's algorithm on a quantum computer—some lattice-based constructions appear to be...
    24 KB (2,872 words) - 22:30, 4 July 2025
  • Modular exponentiation (category Cryptographic algorithms)
    quantum computing, modular exponentiation appears as the bottleneck of Shor's algorithm, where it must be computed by a circuit consisting of reversible gates...
    21 KB (2,759 words) - 02:20, 29 June 2025
  • Thumbnail for Phase kickback
    exponentially quicker than classical algorithms. This is essential for quantum algorithms such as Shor’s algorithm, where quantum phase estimation is used...
    13 KB (1,715 words) - 23:35, 25 April 2025
  • of the protocol" for its second revision. Post-quantum cryptography Shor's algorithm Signal Protocol Signal (software) Public-key cryptography End-to-end...
    3 KB (266 words) - 22:37, 29 September 2024
  • immune to attacks using Shor's algorithm and – more generally – measuring coset states using Fourier sampling. The algorithm is based on the hardness...
    16 KB (2,093 words) - 11:24, 4 July 2025
  • public key algorithms, such as RSA and ElGamal would become insecure if an effective quantum computer could be built (due to Shor's algorithm). The Merkle...
    8 KB (1,453 words) - 01:08, 3 March 2025
  • and capable of executing a program known as Shor's algorithm will easily accomplish the task. Shor's algorithm can also quickly break digital signatures...
    19 KB (2,570 words) - 18:15, 3 July 2025
  • Thumbnail for Timeline of quantum computing and communication
    conventional computer. This algorithm introduces the main ideas which were then developed in Peter Shor's factorization algorithm. Peter Shor, at AT&T's Bell Labs...
    235 KB (22,807 words) - 23:08, 25 July 2025
  • Primality test (category Asymmetric-key algorithms)
    asymptotically faster than by using classical computers. A combination of Shor's algorithm, an integer factorization method, with the Pocklington primality test...
    27 KB (3,833 words) - 09:23, 3 May 2025
  • discrete logarithms, like ECDSA, problems solved in polynomial time with Shor's algorithm. Schneier, Bruce (2004). Secrets and Lies. Wiley Publishing, Inc. p...
    3 KB (317 words) - 21:53, 10 June 2025