A Discussion of Approaches to Quantum-Resistant Cryptography

57 views
Download
  • Share
Create Account or Sign In to post comments
#quantum computing #cryptography

(Q&A at 29:00 + 42:30) -- quantum-resistant algorithms, lattice-based, multivariate, code-based, hash functions, advantages, research ... Chuck Easttom, Adjunct professor, University of Dallas; CS Distinguished Lecturer
The talk compares and contrasts proposed quantum-resistant cryptographic algorithms. This will include discussion of lattice-based algorithms, multivariate cryptography, code-based cryptography, super singular isogeny key exchange, and hash functions. The advantages and disadvantages of each, as well as current research in these algorithms, will be explored.  Access the speaker's slides:
https://r6.ieee.org/scv-cs/?p=1916

Dr. Chuck Easttom is the author of 34 books, including several on computer security, forensics, and cryptography. He holds a Doctor of Science in cyber security, a Ph.D. in Nanotechnology, a Ph.D. in computer science, and three master’s degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of both the IEEE and the ACM. He is also a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. Dr. Easttom is currently an adjunct professor for Georgetown University and for the University of Dallas.

(Q&A at 29:00 + 42:30) -- quantum-resistant algorithms, lattice-based, multivariate, code-based, hash functions, advantages, research ... Chuck Easttom, Adjunct professor, University of Dallas; CS Distinguished Lecturer. The talk compares and contrasts proposed quantum-resistant cryptographic algorithms. Access slides: https://r6.ieee.org/scv-cs/?p=1916

Speakers in this video

Advertisment

Advertisment