Global web icon
pqcrypto.org
https://2017.pqcrypto.org/school/slides/pqimp.pdf
Something with implementations - PQCrypto
Attacker can log in remotely (ssh) Some attacks work by measuring network delays Attacker does not even need an account on the target machine
Global web icon
pqcrypto.org
https://2017.pqcrypto.org/school/slides/pqc-intro.…
Introduction to post-quantum cryptography
Cryptography Motivation #1: Communication channels are spying on our data. Motivation #2: Communication channels are modifying our data. Sender Untrustworthy network \Alice" \Eve" Literal meaning of cryptography: \secret writing".
Global web icon
pqcrypto.org
https://2017.pqcrypto.org/conference/slides/baloo.…
PowerPoint-presentatie
“Without quantum-safe encryption, everything that has been transmitted, or will ever be transmitted, over a network is vulnerable to eavesdropping and public disclosure.”