Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Post-Quantum Isogeny Cryptography

media.ccc.de via YouTube

Overview

Explore post-quantum isogeny cryptography in this 52-minute conference talk from the 36C3 event. Dive into the world of elliptic curves and isogenies, understanding their potential for building strong cryptosystems in a post-quantum era. Learn about various post-quantum cryptography approaches, including lattice-based, code-based, and multivariate polynomial systems. Gain insights into how elliptic curve isogenies work and their applications in secure key exchange and signature algorithms. Follow along as the speaker breaks down complex concepts like supersingular curves, point addition law, and revolution graphs for a broad audience. Discover the implications of quantum supremacy on classical cryptography and the importance of developing secure post-quantum alternatives. Engage with topics such as generic algorithms, homomorphic encryption, and twin elliptic curves. Conclude with a summary, Q&A session, and references to further resources on this cutting-edge cryptographic field.

Syllabus

Intro
PostQuantum Cryptography Zoo
Generic Algorithms
Isogen
Elliptical Curves
Point Addition Law
In Practice
Revolution Graphs
Summary
Key Exchange
Conclusion
Questions
Craig Costello
Homomorphic Encryption
Twin elliptic curves

Taught by

media.ccc.de

Reviews

Start your review of Post-Quantum Isogeny Cryptography

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.