Главная
Study mode:
on
1
Introduction
2
What is Cryptography
3
Traditional Use of Cryptography
4
Applications of Cryptography
5
Symmetric Encryption
6
Key established protocols
7
Modern secure communication
8
Quantum security
9
Quantum computers
10
Grovers algorithm
11
Building quantum computers
12
Cryptulator attack mode
13
Postquant cryptography
14
Mathematical problems
15
Latticebased cryptography
16
Security of codebased cryptography
17
Postquantum standardization process
18
Breaking Rainbow
19
Fourth Round
20
Questions
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Explore the impact of quantum computing on cryptography in this 40-minute talk by Carlos Cid from Simula UiB and Okinawa Institute of Science and Technology. Delve into the world of post-quantum cryptographic algorithms and their importance in maintaining security in the face of advancing quantum technologies. Learn about the ongoing NIST standardization process for selecting post-quantum encryption and signature schemes. Gain insights into traditional cryptography applications, symmetric encryption, key establishment protocols, and modern secure communication methods. Understand quantum security concepts, including Grover's algorithm and the challenges of building quantum computers. Examine post-quantum cryptography, focusing on mathematical problems, lattice-based cryptography, and code-based cryptography security. Discover the latest developments in the post-quantum standardization process, including the breaking of the Rainbow algorithm and the current state of the fourth round. Conclude with a Q&A session to address any remaining questions on this crucial topic in the evolving landscape of cryptographic research and real-world implementation. Read more

Cryptography in a Post-Quantum World

Gemini Center on Quantum Computing
Add to list
0:00 / 0:00