Quantum Computers and Quantum Secure Communications
| Lecturer (assistant) | |
|---|---|
| Number | 0000003718 |
| Type | lecture with integrated exercises |
| Term | Sommersemester 2026 |
| Language of instruction | English |
| Position within curricula | See TUMonline |
| Dates | See TUMonline |
- 24.04.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 08.05.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 15.05.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 22.05.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 29.05.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 05.06.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 12.06.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 19.06.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 26.06.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 03.07.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 10.07.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
- 17.07.2026 15:00-18:15 N 1080 ZG, August-Föppl-Hörsaal
Admission information
Objectives
At the end of this module, students 1) are able to understand the basic concepts of quantum computers and post-quantum cryptography; 2) are familiar with quantum and post-quantum algorithms; 3) understand the vulnerabilities of post-quantum cryptography implementations; 4) can evaluate the security and performance of Post-Quantum cryptographic implementations; and 5) can apply security countermeasures to post-quantum cryptographic implementations.
Description
The course is comprised of a lecture accompanied by exercises and a project part..
The topics presented in the class are:
1) Introductory lecture;
2) Quantum computing and technologies;
3) Quantum algorithms;
4) Post-quantum algorithms general description;
5) Post-quantum implementation and evaluation;
6) Secure implementation.
The topics presented in the class are:
1) Introductory lecture;
2) Quantum computing and technologies;
3) Quantum algorithms;
4) Post-quantum algorithms general description;
5) Post-quantum implementation and evaluation;
6) Secure implementation.
Prerequisites
Knowledge of programming, basics on security like it is taught in the lecture Embedded Systems and Security.