Exploring the Security Profile of QKD
In this video, we take a high level look at the crucial aspects of QKD’s security profile, including: - Understanding the difference between rigorous securi...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.
About this video
In this video, we take a high level look at the crucial aspects of QKD’s security profile, including:
- Understanding the difference between rigorous security proofs and real-world hardware vulnerabilities.
- What side channel attacks are and how they target the hardware implementing cryptographic protocols, rather than the protocols themselves.
- A look at specific side channel attacks
- Why securing the hardware of QKD systems is as vital as the theoretical security of the protocols.
Click here to meet with a sales rep: https://calendly.com/mikew-alirosecurity
Watch the full webinar: https://www.brighttalk.com/webcast/19861/618463
Follow Aliro on X: https://twitter.com/AliroQuantum
Follow Aliro on LinkedIn: https://www.linkedin.com/company/aliroquantum/
Want the latest in Quantum Networking news, research, and deployments? Get our newsletter delivered to your inbox once a month: https://www.aliroquantum.com/quantum-connect-newsletter
Want more information on entanglement-based networks? Check out our on-demand and live webinars: https://www.brighttalk.com/channel/19861
Video Information
Views
36
Total views since publication
Likes
2
User likes and reactions
Duration
2:03
Video length
Published
Sep 11, 2024
Release date
Quality
hd
Video definition
Captions
Available
Subtitles enabled