{"id":67671,"date":"2022-09-16T08:00:00","date_gmt":"2022-09-16T06:00:00","guid":{"rendered":"https:\/\/eiposgrados.com\/?post_type=evento&#038;p=67671"},"modified":"2022-09-15T10:41:48","modified_gmt":"2022-09-15T08:41:48","slug":"quantum-computers-quantum-cryptography-and-post-quantum-cryptography-2","status":"publish","type":"evento","link":"https:\/\/eiposgrados.com\/eng\/events\/quantum-computers-quantum-cryptography-and-post-quantum-cryptography-2\/","title":{"rendered":"Quantum computers, quantum cryptography and post-quantum cryptography"},"content":{"rendered":"<h2 class=\"gb-headline gb-headline-2af66e92 gb-headline-text\"><strong>Description of EIP Talks<\/strong>:<\/h2>\n\n\n\n<p>Do you know what the difference is between quantum computing, quantum cryptography and post-quantum cryptography?<\/p>\n\n\n\n<p>The truth is that, although they sound similar and are terms that continually appear tangled in conversations about cybersecurity, they have (almost) nothing to do with each other. <\/p>\n\n\n\n<p>In this EIP Talks session you will learn what every cybersecurity professional should know about these three concepts to participate in a conversation without screwing up or getting caught.<\/p>\n\n\n\n<p><strong>Let&#039;s unravel this quantum tangle!<\/strong><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>COMPUTACI\u00d3N\u00a0CU\u00c1NTICA: superposici\u00f3n y enredo para paralelismo masivo, aplicado a la factorizaci\u00f3n y a la b\u00fasqueda en listas ordenadas<br \/>\nDISTRIBUCI\u00d3N CU\u00c1NTICA DE CLAVES (QKD): comunicaci\u00f3n cu\u00e1ntica aplicada a la distribuci\u00f3n de claves aleatorias<br \/>\nCRIPTOGRAF\u00cdA POST-CU\u00c1NTICA (PQC): algoritmos de criptograf\u00eda cl\u00e1sica resistentes a los ordenadores cu\u00e1nticos basados en hashes, c\u00f3digos y celos\u00edas<\/p>","protected":false},"featured_media":64239,"template":"","area_evento":[1079],"class_list":["post-67671","evento","type-evento","status-publish","has-post-thumbnail","hentry","area_evento-ciberseguridad-y-programacion-python"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento\/67671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/evento"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento\/67671\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/64239"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=67671"}],"wp:term":[{"taxonomy":"area_evento","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/area_evento?post=67671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}