Skip to content

Details

Anna will explain the two principal known applications of quantum information processing to cyber security and cryptography: breaking public key encryption and secure quantum key distribution. The first of these will involve an explanation of public-key cryptography and the RSA algorithm, as well as Peter Shor's quantum algorithm. The second of these will involve discussion of the requirements for secure key distribution and the use of photonics for quantum information processing.

Cloud Computing
High Performance Computing
High Scalability Computing
Computers
Computing

Members are also interested in