Quantum Computers and Quantum Secure Communications
Lecturer (assistant) | |
---|---|
Number | 0000003718 |
Type | lecture with integrated exercises |
Term | Sommersemester 2025 |
Language of instruction | English |
Position within curricula | See TUMonline |
Dates | See TUMonline |
- 25.04.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 02.05.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 09.05.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 16.05.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 23.05.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 30.05.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 06.06.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 13.06.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 20.06.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 27.06.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 04.07.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 11.07.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 18.07.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 25.07.2025 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
Admission information
Objectives
At the end of this module, students 1) are able to understand the basic concepts of quantum computers and post-quantum cryptography; 2) are familiar with quantum and post-quantum algorithms; 3) understand the vulnerabilities of post-quantum cryptography implementations; 4) can evaluate the security and performance of Post-Quantum cryptographic implementations; and 5) can apply security countermeasures to post-quantum cryptographic implementations.
Description
The course is comprised of a lecture accompanied by exercises and a project part..
The topics presented in the class are:
1) Introductory lecture;
2) Quantum computing and technologies;
3) Quantum algorithms;
4) Post-quantum algorithms general description;
5) Post-quantum implementation and evaluation;
6) Secure implementation.
The topics presented in the class are:
1) Introductory lecture;
2) Quantum computing and technologies;
3) Quantum algorithms;
4) Post-quantum algorithms general description;
5) Post-quantum implementation and evaluation;
6) Secure implementation.
Prerequisites
Knowledge of programming, basics on security like it is taught in the lecture Embedded Systems and Security.