{"id":25199,"date":"2016-04-29T20:02:09","date_gmt":"2016-04-30T03:02:09","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/04\/futuristic-post-quantum-cryptography-is-subject-of-uwt-symposium"},"modified":"2017-06-04T20:01:10","modified_gmt":"2017-06-05T03:01:10","slug":"futuristic-post-quantum-cryptography-is-subject-of-uwt-symposium","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/04\/futuristic-post-quantum-cryptography-is-subject-of-uwt-symposium","title":{"rendered":"Futuristic \u2018post-quantum\u2019 cryptography is subject of UWT symposium"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/futuristic-post-quantum-cryptography-is-subject-of-uwt-symposium.jpg\"><\/a><\/p>\n<p>Post-quantum cryptography discussion in Tacoma WA on May 5th discussing hacking by QC hackers and leveraging Cryptography algorithms to offset the attacks; may be of interest to sit in and even join in the debates. I will try attend if I can because it would be interesting to see the arguments raised and see the responses.<\/p>\n<hr>\n<p>The University of Washington Tacoma Institute of Technology will present a discussion about the esoteric field of post-quantum cryptography at the Northwest Cybersecurity Symposium on May 5.<\/p>\n<p>\u201cI\u2019ve been researching post-quantum cryptography for years, finding ways to protect against a threat that doesn\u2019t yet exist,\u201d said Anderson Nascimento, assistant professor of computer science at the institute, in a release.<\/p>\n<p>Post-quantum cryptography refers to encryption that would be secure against an attack by a quantum computer \u2014 a kind of supercomputer using quantum mechanics, which, so far, exists only in theory.<\/p>\n<p><!-- Link: <a href=\"http:\/\/www.thenewstribune.com\/news\/business\/article74730717.html\">http:\/\/www.thenewstribune.com\/news\/business\/article74730717.html<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Post-quantum cryptography discussion in Tacoma WA on May 5th discussing hacking by QC hackers and leveraging Cryptography algorithms to offset the attacks; may be of interest to sit in and even join in the debates. I will try attend if I can because it would be interesting to see the arguments raised and see the [\u2026]<\/p>\n","protected":false},"author":395,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1625,41,1617,44],"tags":[],"class_list":["post-25199","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-encryption","category-information-science","category-quantum-physics","category-supercomputing"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/395"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=25199"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25199\/revisions"}],"predecessor-version":[{"id":67604,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/25199\/revisions\/67604"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=25199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=25199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=25199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}