{"guid":"0e58d252-7497-45e7-9110-c4a527f781cc","title":"Post-Quantum Cryptography","subtitle":null,"slug":"muccc-56367-post-quantum-cryptography","link":"https://wiki.muc.ccc.de/events:vortrag-pq-crypto","description":"In this presentation, I  will provide an overview of the emerging threat of quantum computing against cryptography and its proposed solutions. No major prerequisites will be needed, but I will assume some familiarity with basic concepts of applied cryptography.\n\nIn this presentation, I will provide an overview of the emerging threat of quantum computing against cryptography and its proposed solutions. No major prerequisites will be needed, but I will assume some familiarity with basic concepts of applied cryptography.\ny⁷ is a long-time CTF player with team hxp and since 2023 an assistant professor for cryptography at TUM. His research mostly focuses on post-quantum cryptography, with particular attention to the use of isogenies between abelian varieties, cryptanalysis, and fast algorithms.\n\nLicensed to the public under https://creativecommons.org/licenses/by/4.0/","original_language":"eng","persons":["y⁷"],"tags":["56367","2025","muc","Hauptraum","muc-eng"],"view_count":549,"promoted":false,"date":"2025-07-18T20:30:00.000+02:00","release_date":"2025-07-22T00:00:00.000+02:00","updated_at":"2026-04-11T00:15:03.942+02:00","length":4136,"duration":4136,"thumb_url":"https://static.media.ccc.de/media/regional/muenchen/hackfriday/56367-0e58d252-7497-45e7-9110-c4a527f781cc.jpg","poster_url":"https://static.media.ccc.de/media/regional/muenchen/hackfriday/56367-0e58d252-7497-45e7-9110-c4a527f781cc_preview.jpg","timeline_url":"https://static.media.ccc.de/media/regional/muenchen/hackfriday/56367-0e58d252-7497-45e7-9110-c4a527f781cc.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/regional/muenchen/hackfriday/56367-0e58d252-7497-45e7-9110-c4a527f781cc.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/muccc-56367-post-quantum-cryptography","url":"https://media.ccc.de/public/events/0e58d252-7497-45e7-9110-c4a527f781cc","conference_title":"muCCC Hack!Friday","conference_url":"https://media.ccc.de/public/conferences/muccc","related":[],"recordings":[{"size":228,"length":4136,"mime_type":"video/webm;codecs=av01","language":"eng","filename":"muc-56367-eng-Post-Quantum_Cryptography_av1-hd.webm","state":"new","folder":"av1-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-07-22T02:34:28.397+02:00","recording_url":"https://cdn.media.ccc.de/contributors/muenchen/hackfriday/av1-hd/muc-56367-eng-Post-Quantum_Cryptography_av1-hd.webm","url":"https://media.ccc.de/public/recordings/88874","event_url":"https://media.ccc.de/public/events/0e58d252-7497-45e7-9110-c4a527f781cc","conference_url":"https://media.ccc.de/public/conferences/muccc"},{"size":116,"length":4136,"mime_type":"video/mp4","language":"eng","filename":"muc-56367-eng-Post-Quantum_Cryptography_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2025-07-22T02:25:18.064+02:00","recording_url":"https://cdn.media.ccc.de/contributors/muenchen/hackfriday/h264-sd/muc-56367-eng-Post-Quantum_Cryptography_sd.mp4","url":"https://media.ccc.de/public/recordings/88873","event_url":"https://media.ccc.de/public/events/0e58d252-7497-45e7-9110-c4a527f781cc","conference_url":"https://media.ccc.de/public/conferences/muccc"},{"size":233,"length":4136,"mime_type":"video/mp4","language":"eng","filename":"muc-56367-eng-Post-Quantum_Cryptography_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2025-07-22T02:25:12.099+02:00","recording_url":"https://cdn.media.ccc.de/contributors/muenchen/hackfriday/h264-hd/muc-56367-eng-Post-Quantum_Cryptography_hd.mp4","url":"https://media.ccc.de/public/recordings/88872","event_url":"https://media.ccc.de/public/events/0e58d252-7497-45e7-9110-c4a527f781cc","conference_url":"https://media.ccc.de/public/conferences/muccc"}]}