YoVDO

How to Implement a Quantum Key Distribution Protocol on IBM's Quantum Computer

Offered By: DefCamp via YouTube

Tags

DefCamp Courses Cryptography Courses Quantum Computing Courses Secure Communication Courses Quantum Key Distribution Courses

Course Description

Overview

Explore a conference talk from DefCamp 2019 that delves into implementing a quantum key distribution protocol using IBM's quantum computer. Learn about cutting-edge developments in quantum cryptography and information security during this 55-minute presentation. Gain insights into the practical applications of quantum computing in cybersecurity, as demonstrated at one of Central and Eastern Europe's premier hacking and information security conferences. Discover how quantum key distribution protocols can enhance secure communication methods and protect against potential future threats. Access additional resources, including slides and presentations, through the provided DefCamp archive link to further expand your knowledge on this advanced topic.

Syllabus

How to implement a quantum key distribution protocol on IBM's quantum computer at DefCamp 2019


Taught by

DefCamp

Related Courses

The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022
DefCamp via YouTube
The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube
Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube
How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube
To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube