List of Tables

2.1 Common Symbols and Notation
4.1 Useful Exact and Approximate Values in Binary
7.1 Worst Case Brute Force Time for Different Keys
7.2 Cryptanalysis of Triple-DES and AES
20.1 Worst Case Brute Force Attempts with Classical and Quantum Algorithms