Post Quantum Cryptography for Dummies
Offered By: YouTube
Course Description
Overview
Explore post-quantum cryptography in this 47-minute conference talk from BSides Tampa 2020. Delve into public key cryptography, RSA, and quantum computing concepts. Learn about Niels Bohr, Jung, and Schrödinger's equation. Understand Moore's Law, Turing machines, and quantum bits. Discover quantum algorithms, supremacy, and their impact on cryptography. Examine different methods and environmental issues in quantum computing. Gain insights into the future of cryptography and NIST's role in developing post-quantum solutions.
Syllabus
Intro
Welcome
Shoutouts
PublicKey Cryptography
RSA
Example
How does it affect this
Niels Bohr
Jung
Single Electrons
Schrodinger Equation
Schrodingers Cat
Quantum Computers
Moores Law
Turing Machine
Parallelism
Quantum Computer
Quantum Bits
Environmental Issues
Different Methods
Quantumentanglement
Why Care
Quantum Algorithms
Quantum Supremacy
The Once May It Keep Going
What Can We Do
NIST
Related Courses
Introduction to CryptologyIndian Institute of Technology Roorkee via Swayam Classical Cryptosystems and Core Concepts
University of Colorado System via Coursera Cyber Attack Countermeasures
New York University (NYU) via Coursera Introduction to Blockchain Technologies
INSEAD via Coursera Introduction to Applied Cryptography
University of Colorado System via Coursera