|
You are here |
www.schneier.com | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | ||
| | | | |
blog.cr.yp.to
|
|
| | | | | [AI summary] The text discusses various arguments and perspectives on the feasibility and implications of quantum computing, particularly its impact on cryptography and cybersecurity. It references historical and current developments in quantum computing, including Google's surface code experiments, and critiques arguments that quantum computers are impossible or that their threats are predictable. The text also addresses the secrecy of quantum computing advancements, the potential for leaks, and the economic and logistical challenges of maintaining such projects in the dark. The author concludes that while quantum computing poses a significant threat to current encryption methods, the exact timeline and extent of its impact remain uncertain, and the focus s... | |
| | | | |
scottaaronson.blog
|
|
| | | | | So, back in June the White House announced that UCLA would host a binational US/India workshop, for national security officials from both countries to learn about the current status of quantum computing and post-quantum cryptography. It fell to my friend and colleague Rafail Ostrovsky to organize the workshop, which ended up being held last week.... | |
| | | | |
jaketae.github.io
|
|
| | | Note: This blog post was completed as part of Yale's CPSC 482: Current Topics in Applied Machine Learning. | ||