1. Moscone West 2014

Are you an IT security professional, but not a mathematician? This session will explain you how post-quantum cryptography works—with a 100 percent cartoon-based slide show. All cartoon stories presented refer to easy-to-understand analogies. No advanced mathematical skills are required. Among the post-quantum methods covered are NTRU, Google’s “New Hope,” (R)LWE, QUARTZ and SLFLASH.

Pre-Requisites: Understanding the concept of asymmetric cryptography Basic mathematical skills (vectors, matrices, polynomials)

Download pdf
Participants: