Post-Quantum Hardware Implementations
Offered By: TheIACR via YouTube
Course Description
Overview
Explore cutting-edge developments in post-quantum cryptography hardware implementations during this 54-minute session. Gain insights into the latest techniques and strategies for designing and implementing quantum-resistant cryptographic systems in hardware. Delve into topics such as lattice-based cryptography, multivariate cryptography, and hash-based signatures, and their practical applications in hardware architectures. Learn about the challenges and opportunities in creating efficient and secure post-quantum hardware solutions to protect against future quantum computing threats.
Syllabus
Session on Post Quantum Hardware Implementations
Taught by
TheIACR
Related Courses
Lattices, Post-Quantum Security and Homomorphic EncryptionSimons Institute via YouTube The Learning With Errors Problem and Cryptographic Applications
Simons Institute via YouTube Fault Attacks on CCA-Secure Lattice KEMs
TheIACR via YouTube Lattice-Based Cryptography
TheIACR via YouTube Lattice-Based Cryptography
TheIACR via YouTube