Quantum Computers and Quantum Secure Communications
Lecturer (assistant) | |
---|---|
Number | 0000003718 |
Type | lecture with integrated exercises |
Term | Sommersemester 2024 |
Language of instruction | English |
Position within curricula | See TUMonline |
Dates | See TUMonline |
- 19.04.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 26.04.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 03.05.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 10.05.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 17.05.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 24.05.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 31.05.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 07.06.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 14.06.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 21.06.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 28.06.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 05.07.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 12.07.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 19.07.2024 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
Admission information
Objectives
At the end of this module, students 1) are able to understand the basic concepts of quantum computers and post-quantum cryptography; 2) are familiar with quantum and post-quantum algorithms; 3) understand the vulnerabilities of post-quantum cryptography implementations; 4) can evaluate the security and performance of Post-Quantum cryptographic implementations; and 5) can apply security countermeasures to post-quantum cryptographic implementations.
Description
The course is comprised of a lecture accompanied by exercises and a project part..
The topics presented in the class are:
1) Introductory lecture;
2) Quantum computing and technologies;
3) Quantum algorithms;
4) Post-quantum algorithms general description;
5) Post-quantum implementation and evaluation;
6) Secure implementation.
The topics presented in the class are:
1) Introductory lecture;
2) Quantum computing and technologies;
3) Quantum algorithms;
4) Post-quantum algorithms general description;
5) Post-quantum implementation and evaluation;
6) Secure implementation.
Prerequisites
Knowledge of programming, basics on security like it is taught in the lecture Embedded Systems and Security.