Главная
Study mode:
on
1
Intro
2
PostQuantum Cryptography Zoo
3
Generic Algorithms
4
Isogen
5
Elliptical Curves
6
Point Addition Law
7
In Practice
8
Revolution Graphs
9
Summary
10
Key Exchange
11
Conclusion
12
Questions
13
Craig Costello
14
Homomorphic Encryption
15
Twin elliptic curves
Description:
Explore post-quantum isogeny cryptography in this 52-minute conference talk from the 36C3 event. Dive into the world of elliptic curves and isogenies, understanding their potential for building strong cryptosystems in a post-quantum era. Learn about various post-quantum cryptography approaches, including lattice-based, code-based, and multivariate polynomial systems. Gain insights into how elliptic curve isogenies work and their applications in secure key exchange and signature algorithms. Follow along as the speaker breaks down complex concepts like supersingular curves, point addition law, and revolution graphs for a broad audience. Discover the implications of quantum supremacy on classical cryptography and the importance of developing secure post-quantum alternatives. Engage with topics such as generic algorithms, homomorphic encryption, and twin elliptic curves. Conclude with a summary, Q&A session, and references to further resources on this cutting-edge cryptographic field.

Post-Quantum Isogeny Cryptography

media.ccc.de
Add to list
0:00 / 0:00