Posted on
in Presentations
Are you an IT security professional, but not a mathematician? This session will explain you how post-quantum cryptography works—with a 100 percent cartoon-based slide show. All cartoon stories presented refer to easy-to-understand analogies. No advanced mathematical skills are required. Among the post-quantum methods covered are NTRU, Google’s “New Hope,” (R)LWE, QUARTZ and SLFLASH.
Pre-Requisites: Understanding the concept of asymmetric cryptography Basic mathematical skills (vectors, matrices, polynomials)
Pre-Requisites: Understanding the concept of asymmetric cryptography Basic mathematical skills (vectors, matrices, polynomials)
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community