Finally, we calculate the number of physical qubits required to break the 256-bit elliptic curve encryption of keys in the Bitcoin network within the small available time frame in which it would actually pose a threat to do so. It would require 317 × 106 physical qubits to break the encryption within one hour using the surface code, a code cycle time of 1 μs, a reaction time of 10 μs, and a physical gate error of 10-3. To instead break the encryption within one day, it would require 13 × 106 physical qubits.
Governments are back on their anti-encryption bullshit again. Between the U.S. Senate's "EARN IT" Act, the E.U.'s slew of anti-encryption proposals, and Australia's new anti-encryption law, it's become clear that the authoritarians in office view online privacy as a threat to their existence. Normally, when the governments increase their anti-privacy sabre-rattling, technologists start talking more…
M. Barbosa, T. Brouard, S. Cauchie, and S. de Sousa. Information Security and Privacy, volume 5107 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2008)
M. Mankar, D. Kshirsagar, and Prof.M.V.Vyawahare. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (4):
2326--2329(April 2015)
S. Kuswaha, P. Choudhary, S. Waghmare, and N. Patil. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (4):
1964--1969(April 2015)
A. Mehta, R. Bhagat, H. Chheda, and S. Sanghani. International Journal on Recent and Innovation Trends in Computing and Communication, 3 (2):
866--868(February 2015)
P. Henning, M. Yassene, B. Michael, and S. Matthew. 2012 IEEE Eighth International Conference on eScience, 2012 IEEE Eighth International Conference on eScience, Los Alamitos, CA, USA, IEEE Computer Society, IEEE Computer Society, (2012)
S. Fahl, M. Harbach, T. Muders, M. Smith, and U. Sander. Proceedings of the Eighth Symposium on Usable Privacy and Security, page 11:1--11:17. New York, NY, USA, ACM, (2012)
S. Hick, B. Esslinger, and A. Wacker. The 10th International Conference on Education and Information Systems,Technologies and Applications (EISTA 2012), Orlando, Florida, USA, (17-20 Juli 2012)
B. Preneel. State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures, page 49-104. London, UK, Springer-Verlag, (1998)
S. Fluhrer, I. Mantin, and A. Shamir. SAC '01: Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography, page 1-24. London, UK, Springer-Verlag, (2001)
Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai. Cryptology ePrint Archive, Report 2004/338, (2005)supersedes a previous version which is entitled as 'Identity-Based
Encryption with Non-Interactive Key Update'..
J. Camenisch, and E. Herreweghen. CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, page 21-30. New York, NY, USA, ACM, (2002)