Explore cutting-edge developments in post-quantum cryptography hardware implementations during this 54-minute session. Gain insights into the latest techniques and strategies for designing and implementing quantum-resistant cryptographic systems in hardware. Delve into topics such as lattice-based cryptography, multivariate cryptography, and hash-based signatures, and their practical applications in hardware architectures. Learn about the challenges and opportunities in creating efficient and secure post-quantum hardware solutions to protect against future quantum computing threats.
Overview
Syllabus
Session on Post Quantum Hardware Implementations
Taught by
TheIACR