http://lbry.pjsfkvpxlinjamtawaksbnnaqs2fc2mtvmozrzckxh7f3kis6yea25ad.onion/@veritasium:f/how-quantum-computers-break-the:1
IEEE transactions on Information Theory, 22(6), 644-654. - https://ve42.co/Hellman1976 Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. - https://ve42.co/Rivest1978 Kak, A. (2023).