Главная
Study mode:
on
1
Intro
2
Welcome
3
Shoutouts
4
PublicKey Cryptography
5
RSA
6
Example
7
How does it affect this
8
Niels Bohr
9
Jung
10
Single Electrons
11
Schrodinger Equation
12
Schrodingers Cat
13
Quantum Computers
14
Moores Law
15
Turing Machine
16
Parallelism
17
Quantum Computer
18
Quantum Bits
19
Environmental Issues
20
Different Methods
21
Quantumentanglement
22
Why Care
23
Quantum Algorithms
24
Quantum Supremacy
25
The Once May It Keep Going
26
What Can We Do
27
NIST
Description:
Explore post-quantum cryptography in this 47-minute conference talk from BSides Tampa 2020. Delve into public key cryptography, RSA, and quantum computing concepts. Learn about Niels Bohr, Jung, and Schrödinger's equation. Understand Moore's Law, Turing machines, and quantum bits. Discover quantum algorithms, supremacy, and their impact on cryptography. Examine different methods and environmental issues in quantum computing. Gain insights into the future of cryptography and NIST's role in developing post-quantum solutions.

Post Quantum Cryptography for Dummies

Add to list
0:00 / 0:00