Bitcoin has several attack vectors that can be exploited by a quantum computer. Various algorithms, such as Shor’s algorithm (for integer factorization) and Grover’s algorithm (Search), pose significant threats to the Bitcoin protocol. These algorithms can potentially enable cryptanalytic (brute-force) attacks on different aspects of the known protocol. I can identify three areas with vulnerabilities […]