YoVDO

Post-Quantum Hardware Implementations

Offered By: TheIACR via YouTube

Tags

Post-Quantum Cryptography Courses Lattice-Based Cryptography Courses Multivariate Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore cutting-edge developments in post-quantum cryptography hardware implementations during this 54-minute session. Gain insights into the latest techniques and strategies for designing and implementing quantum-resistant cryptographic systems in hardware. Delve into topics such as lattice-based cryptography, multivariate cryptography, and hash-based signatures, and their practical applications in hardware architectures. Learn about the challenges and opportunities in creating efficient and secure post-quantum hardware solutions to protect against future quantum computing threats.

Syllabus

Session on Post Quantum Hardware Implementations


Taught by

TheIACR

Related Courses

Lattices, Post-Quantum Security and Homomorphic Encryption
Simons Institute via YouTube
The Learning With Errors Problem and Cryptographic Applications
Simons Institute via YouTube
Fault Attacks on CCA-Secure Lattice KEMs
TheIACR via YouTube
Lattice-Based Cryptography
TheIACR via YouTube
Lattice-Based Cryptography
TheIACR via YouTube