Post Quantum Cryptography for Dummies
Offered By: YouTube
Course Description
Overview
Explore post-quantum cryptography in this 47-minute conference talk from BSides Tampa 2020. Delve into public key cryptography, RSA, and quantum computing concepts. Learn about Niels Bohr, Jung, and Schrödinger's equation. Understand Moore's Law, Turing machines, and quantum bits. Discover quantum algorithms, supremacy, and their impact on cryptography. Examine different methods and environmental issues in quantum computing. Gain insights into the future of cryptography and NIST's role in developing post-quantum solutions.
Syllabus
Intro
Welcome
Shoutouts
PublicKey Cryptography
RSA
Example
How does it affect this
Niels Bohr
Jung
Single Electrons
Schrodinger Equation
Schrodingers Cat
Quantum Computers
Moores Law
Turing Machine
Parallelism
Quantum Computer
Quantum Bits
Environmental Issues
Different Methods
Quantumentanglement
Why Care
Quantum Algorithms
Quantum Supremacy
The Once May It Keep Going
What Can We Do
NIST
Related Courses
Quantum Information Science II: Efficient Quantum Computing - fault tolerance and complexityMassachusetts Institute of Technology via edX Quantum Supremacy - Benchmarking the Sycamore Processor
TensorFlow via YouTube The Problem with Qubits
Simons Institute via YouTube Quantum Supremacy via Boson Sampling: Theory and Practice - Quantum Colloquium
Simons Institute via YouTube The Power of Random Quantum Circuits
Simons Institute via YouTube