Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Post-Quantum Manifesto

NorthSec via YouTube

Overview

This course covers the following learning outcomes and goals: understanding the Public Key Revolution, exploring Public Key Cryptography, delving into Quantum Information, summarizing Shor's Factoring Algorithm, discussing the aftermath of quantum computing, identifying new hard problems, learning about Lattice-based Cryptography, exploring Multivariate Cryptography, understanding Code-based Cryptography, and providing key takeaways. The course teaches individual skills and tools such as analyzing quantum cryptography concepts, grasping the fundamentals of public key cryptography, understanding quantum information principles, and exploring various post-quantum cryptographic techniques. The teaching method of the course involves a lecture-style presentation with a focus on theoretical concepts and practical applications in the field of post-quantum cryptography. The intended audience for this course includes individuals interested in cryptography, quantum computing, cybersecurity, and those looking to expand their knowledge of post-quantum cryptographic algorithms and techniques.

Syllabus

Intro
The Public Key Revolution
Public Key Cryptography
Quantum Information
Shor's Factoring Algorithm in a Nutshell
The Aftermath
Finding New Hard Problems
Lattice-based Cryptography
Multivariate Cryptography
Code-based Cryptography
Takeaways

Taught by

NorthSec

Reviews

Start your review of Post-Quantum Manifesto

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.