Quantum Algorithms and Post-Quantum Cryptography

Quantum Algorithms and Post-Quantum Cryptography

Simons Institute via YouTube Direct link

Intro

1 of 25

1 of 25

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Quantum Algorithms and Post-Quantum Cryptography

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Exponential Speedups for Oracle Problems
  3. 3 NIST Post-Quantum Cryptography Standardization
  4. 4 Developing New Systems
  5. 5 Looking for Hard Problems for Crypto
  6. 6 Back to Lattices and Quantum Algorithms
  7. 7 What Makes Good Crypto?
  8. 8 Lattices, Cryptography, and Quantum Algorithms
  9. 9 Quantum Algorithm for the Unit Group
  10. 10 Special Cases of Lattices
  11. 11 The Unit Group and Finding Short Generators
  12. 12 Computing the Short Generator
  13. 13 Quantum Algorithm for Lattices?
  14. 14 What Else Can be used for Post-Quantum Crypto?
  15. 15 Crypto and Algorithms
  16. 16 Hard Isogeny Problem
  17. 17 The isogeny problem
  18. 18 The supersingular -isogeny graph
  19. 19 Two types of isogeny graphs
  20. 20 More Assumptions for Efficiency
  21. 21 How Secure is Isogeny-Based Crypto?
  22. 22 Computational Challenges
  23. 23 Three hardness assumptions
  24. 24 Finding Cycles in the Isogeny Graph using Structure
  25. 25 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.