Data protection after the advent of a quantum computer – post-quantum cryptography
- Security
- Accepted
November 14, 12:45
Room I|I зал
Add to gCal Add to iCal/Outlook
Discuss the presentation
- The relevance of the threats of quantum computers to business and governments.
- Comparison of current data protection methods.
- How does post-quantum cryptography works?