filmov
tv
DEF CON 23 - Crypto and Privacy Village - Marina - Hacking Quantum Cryptography
Показать описание
Hacking Quantum Cryptography
Marina (bt3)
Alice and Bob’s quest through the fascinating quantum mechanics world as a way to avoid archvilainess Eve eavesdropping. In 1994, Peter Shor showed that many of the cryptosystems used today can be broken using a quantum computer. This idea will be explained together with a short overview of qubit systems. Next, we will see how quantum computing gives rise to the possibility of quantum key distribution with unparalleled security. We will end with a brief discussion on post-quantum cryptography concepts.
BIO: Marina is an information security engineer at Yelp, in San Francisco. She finished her PhD in Physics last year, at the University of Stony Brook in New York. During graduate school she researched theoretical and computational Physics at several national laboratories, such as NASA Goddard Space Center, Los Alamos National Laboratory, and Brookhaven National Laboratory. She is an avid CTF player and her first computer was a 386, when she was 5 years-old.
Marina (bt3)
Alice and Bob’s quest through the fascinating quantum mechanics world as a way to avoid archvilainess Eve eavesdropping. In 1994, Peter Shor showed that many of the cryptosystems used today can be broken using a quantum computer. This idea will be explained together with a short overview of qubit systems. Next, we will see how quantum computing gives rise to the possibility of quantum key distribution with unparalleled security. We will end with a brief discussion on post-quantum cryptography concepts.
BIO: Marina is an information security engineer at Yelp, in San Francisco. She finished her PhD in Physics last year, at the University of Stony Brook in New York. During graduate school she researched theoretical and computational Physics at several national laboratories, such as NASA Goddard Space Center, Los Alamos National Laboratory, and Brookhaven National Laboratory. She is an avid CTF player and her first computer was a 386, when she was 5 years-old.
DEF CON 23 - Eijah - Crypto for Hackers
DEF CON 23 - Crypto and Privacy Village - Craig Young - Smart Home Invasion
DEF CON 23 - Crypto and Privacy Village - Marina - Hacking Quantum Cryptography
DEF CON 23 - Crypto and Privacy Village - Freddy Martinez - IMSI Catchers
DEF CON 23 - Crypto and Privacy Village - Nick Sullivan - CFSSL the evolution of a PKI toolkit
DEF CON 23 - Crypto and Privacy Village - Carlson and Doherty - Breaking CBC
DEF CON 23 - Crypto and Privacy Village - Robert Olson - Teaching Privacy Using Red Team Strategies
DEF CON 23 - Colin Flynn - Dont Whisper my Chips: Sidechannel and Glitching for Fun and Profit
Raptoreum Edited Weekly Update for January 19, 2025
DEF CON 23 - Jose Selvi - Breaking SSL Using Time Synchronisation Attacks
PirateSoftware and his craziest DefCon story!
How I cracked an impossible DEF CON challenge
DEF CON 23 - Aditya K Sood - Dissecting the Design of SCADA Web HMIs: Hunting Vulns
DEF CON 23 - Sarah Edwards - Ubiquity Forensics: Your iCloud and You
I Went To DEFCON!
Yes, we actually won
DEF CON 23 - John Seymour - Quantum Classification of Malware
DEF CON 23 - Dr Phil Polstra - Hacker in the Wires
DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris
DefCon 23 Crypto & Privacy Village Badge Hax
DEF CON 23 - Mike Sconzo - I Am Packer And So Can You Video
DEF CON 23 Crypto Badge playing Tetris song
DEF CON 23 Trailer - Declassified!
DEF CON 25 - Konstantinos Karagiannis - Hacking Smart Contracts
Комментарии