YoVDO

Post-Quantum Hardware Implementations

Offered By: TheIACR via YouTube

Tags

Post-Quantum Cryptography Courses Lattice-Based Cryptography Courses Multivariate Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cutting-edge developments in post-quantum cryptography hardware implementations during this 54-minute session. Gain insights into the latest techniques and strategies for designing and implementing quantum-resistant cryptographic systems in hardware. Delve into topics such as lattice-based cryptography, multivariate cryptography, and hash-based signatures, and their practical applications in hardware architectures. Learn about the challenges and opportunities in creating efficient and secure post-quantum hardware solutions to protect against future quantum computing threats.

Syllabus

Session on Post Quantum Hardware Implementations


Taught by

TheIACR

Related Courses

Security Engineering: Automation for CompTIA SecurityX
Pluralsight
On the Security of Proofs of Sequential Work in a Post-Quantum World
Paul G. Allen School via YouTube
Post-Quantum Isogeny Cryptography
media.ccc.de via YouTube
A Cartoon-Based Introduction to Post-Quantum Cryptography
Electronic Frontiers Forums at DragonCon via YouTube
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
IEEE via YouTube