| 1. | The potential commercial and military applications of quantum cryptography are breathtaking.
|
| 2. | It's not about cloak-and-dagger cryptography.
|
| 3. | The pro-cryptography forces mock these reports as scare tactics.
|
| 4. | In cryptography, expander graphs are used to construct hash functions.
|
| 5. | Elliptic curve cryptography algorithms entered wide use in 2004 to 2005.
|
| 6. | Cryptography can introduce security problems when it is not implemented correctly.
|
| 7. | One-time pads solve few current practical problems in cryptography.
|
| 8. | Other techniques such as cryptography were previously restricted to military applications.
|
| 9. | The keys used in public key cryptography have some mathematical structure.
|
| 10. | However, workloads such as cryptography may exhibit much less parallelism.
|