More discussion of encryption vulnerability to Shor Algorithm and Grover's algorithm (using QC to speed up database searches)
Public Cryptography is discussed at SSH
Symmetric cyphers are discussed at SSH
Elliptic curve cryptography at wikipedia.
The Case for Elliptic Curve Cryptography at the NSA.
A list of different kinds of attacks on Cryptographic systems. Article by SSH