An assessment of cryptographic protocols susceptible to quantum attacks
The day a quantum computer is capable of breaking the common encryption schemes we use to protect our data, from medical records to financial transactions, i...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
The day a quantum computer is capable of breaking the common encryption schemes we use to protect our data, from medical records to financial transactions, is commonly referred to as Q-Day. But exactly which of these encryption schemes are vulnerable, and how vulnerable are they? Aliro Quantum Co-Founder Michael Cubeddu discusses what's at risk the vulnerability of different cryptography schemes.
Want more information on quantum networks? Check out our on-demand and live webinars: https://www.brighttalk.com/channel/19861
Follow Aliro Quantum on Twitter: https://twitter.com/AliroQuantum
Follow Aliro Quantum on LinkedIn: https://www.linkedin.com/company/aliroquantum/
Want the latest in Quantum Networking industry news, research, and deployments? Get our newsletter delivered to your inbox once a month: https://www.aliroquantum.com/quantum-connect-newsletter
Video Information
Views
63
Total views since publication
Duration
3:46
Video length
Published
Aug 21, 2023
Release date
Quality
hd
Video definition
Captions
Available
Subtitles enabled