An assessment of cryptographic protocols susceptible to quantum attacks

The day a quantum computer is capable of breaking the common encryption schemes we use to protect our data, from medical records to financial transactions, i...

Aliro•63 views•3:46

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

The day a quantum computer is capable of breaking the common encryption schemes we use to protect our data, from medical records to financial transactions, is commonly referred to as Q-Day. But exactly which of these encryption schemes are vulnerable, and how vulnerable are they? Aliro Quantum Co-Founder Michael Cubeddu discusses what's at risk the vulnerability of different cryptography schemes. Want more information on quantum networks? Check out our on-demand and live webinars: https://www.brighttalk.com/channel/19861 Follow Aliro Quantum on Twitter: https://twitter.com/AliroQuantum Follow Aliro Quantum on LinkedIn: https://www.linkedin.com/company/aliroquantum/ Want the latest in Quantum Networking industry news, research, and deployments? Get our newsletter delivered to your inbox once a month: https://www.aliroquantum.com/quantum-connect-newsletter

Video Information

Views
63

Total views since publication

Duration
3:46

Video length

Published
Aug 21, 2023

Release date

Quality
hd

Video definition

Captions
Available

Subtitles enabled