Overview
This course covers the following learning outcomes and goals: understanding the Public Key Revolution, exploring Public Key Cryptography, delving into Quantum Information, summarizing Shor's Factoring Algorithm, discussing the aftermath of quantum computing, identifying new hard problems, learning about Lattice-based Cryptography, exploring Multivariate Cryptography, understanding Code-based Cryptography, and providing key takeaways.
The course teaches individual skills and tools such as analyzing quantum cryptography concepts, grasping the fundamentals of public key cryptography, understanding quantum information principles, and exploring various post-quantum cryptographic techniques.
The teaching method of the course involves a lecture-style presentation with a focus on theoretical concepts and practical applications in the field of post-quantum cryptography.
The intended audience for this course includes individuals interested in cryptography, quantum computing, cybersecurity, and those looking to expand their knowledge of post-quantum cryptographic algorithms and techniques.
Syllabus
Intro
The Public Key Revolution
Public Key Cryptography
Quantum Information
Shor's Factoring Algorithm in a Nutshell
The Aftermath
Finding New Hard Problems
Lattice-based Cryptography
Multivariate Cryptography
Code-based Cryptography
Takeaways
Taught by
NorthSec