
Post-quantum cryptography is no longer just a futuristic concept, but a necessity in the present day. Anyone who works in the field and ignores its principles and techniques could be left at a severe disadvantage. This course offers a comprehensive overview of post-quantum cryptography.
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
Description
- Introduction to post-quantum cryptography
- Attacks on DLOG and factoring
- Lattices and related algorithms
- LWE and Regev's encryption scheme
- NTRU and NTRUPrime
- Codes and cryptosystems
- Isogenies and elliptic curves
- MQ problem and its variants
- Other candidates for PQC
- Side-channel attacks and countermeasures
Participants attending this course will:
- Have a deep understanding of the post-quantum cryptographic landscape
- Be able to evaluate the security of different cryptographic primitives
- Be able to select suitable cryptographic algorithms for their specific use case and deployment scenario
- Have practical experience implementing and using post-quantum cryptographic schemes
- Understand the mathematical foundations of post-quantum cryptography
- Be familiar with the state-of-the-art in post-quantum cryptography
- Possess knowledge and skills to defend against side-channel and physical attacks on cryptographic implementations
Audience
Professionals
Prerequisites
General knowledge of cryptography