Overview
Syllabus
Introduction
Symmetric Cryptography
Example
Sharing keys
Asymmetric cryptography
Key exchange
Security goal
DiffieHellman key exchange
DiffieHellman problem
Public encryption
Elgamal encryption
Gamble encryption
Quantum computers
Googles quantum computer
IBM didnt like it
Quantum Supremacy
Quantum Computer Protocol
Hbased digital signatures
Based crypto system
Efficiency
Sidechannel attacks
Digital signature schemes
Onetime signature scheme
Verifying signature
Long signature
Binary tree
Verification keys
Complexity
Goal
Mercury
Vector Commitment
Vector commitments
polynomial commitments
emerging proofs
what are the problems
what to do
novel scheme
signature
schema
questions
algorithms
QA
Hash
Scientific paper
Thank you
Quantum cryptography
Quantum key exchange
Taught by
DefCamp