Besides Shor's algorithm and its implications for cryptography