Breaking RSA Using Shor's Algorithm
Introduction
On the structure of this paper
The remainder of this paper is organized as follows: In Section 2, we describe our construction
and the optimizations it uses, and show how to estimate its costs. We then proceed in Section 3 to
describe how existing widely deployed cryptosystems are impacted by our work. In Section 4, we
present several ideas and possible optimizations that we believe are worth exploring in the future.
Finally, we summarize our contributions and their implications in Section 5.