Quantum Lecture Series @ Naval WarCollege - INS Mandovi

August 11, 12 - 2023

Session Folder

Session wise Readings & Decks

abstract shape 14

S 2 - Hardware of a Quantum Computing Device

abstract shape 71

S 3 - Software Architecture of a Quantum based Solution & Algorithms

abstract shape 21

S 4 - Quantum Cryptography & Quantum Internet

Session Deck:
Deck

Readings:
Mosca, Michele. "Cybersecurity in an era with quantum computers: will we be ready?." IEEE Security & Privacy 16, no. 5 (2018): 38-41.

Gidney, Craig, and Martin Ekerå. "How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits." Quantum 5 (2021): 433.

NIST PQC Standardization:

Shor, Peter W. "Algorithms for quantum computation: discrete logarithms and factoring." In Proceedings 35th annual symposium on foundations of computer science, pp. 124-134. Ieee, 1994.

Grover, Lov K. "A fast quantum mechanical algorithm for database search." In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp. 212-219. 1996.

N. Kunihiro. Quantum factoring algorithm: Resource estimation and survey of experiments. In International Symposium on Mathematics, Quantum Theory, and Cryptography, pages 39–55. Springer, Singapore, 2021.

Cryptography in post-quantum world

A Brief Guide to Quantum Encryption vs. Post-Quantum Cryptography

Videos:
The Story of Shor's Algorithm, Straight From the Source | Peter Shor
Quantum Information’s Revolutionary Origins | Charles Bennett
Post-Quantum Cryptography - Chris Peikert

abstract shape 17

S 5 - Use cases Deliberation