Back to course

RSA vs. Quantum Computers

Quantum Computing Basics for Developers

The Cryptographic Threat

Why does Shor's algorithm matter? Most of our internet security relies on the difficulty of factoring primes. We will discuss 'Post-Quantum Cryptography'.