Post-quantum cryptography: Security after Shor’s algorithm