{"id":6226,"date":"2025-11-12T12:20:51","date_gmt":"2025-11-12T10:20:51","guid":{"rendered":"https:\/\/ict-academy.si\/usposabljanje\/applied-cryptography-privacy-and-the-impact-of-quantum-computers\/"},"modified":"2025-11-13T12:35:05","modified_gmt":"2025-11-13T10:35:05","slug":"applied-cryptography-privacy-and-the-impact-of-quantum-computers","status":"publish","type":"tribe_events","link":"https:\/\/ict-academy.si\/en\/usposabljanje\/applied-cryptography-privacy-and-the-impact-of-quantum-computers\/","title":{"rendered":"Applied cryptography, privacy, and the impact of quantum computers"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p><span class=\"TextRun SCXW178939269 BCX0\" lang=\"SL-SI\" data-contrast=\"none\" xml:lang=\"SL-SI\">Overview of useful cryptography<span class=\"NormalTextRun SCXW178939269 BCX0\"> with an emphasis on ensuring privacy in a secure and verifiable manner. Participants will gain <\/span><span class=\"NormalTextRun SCXW178939269 BCX0\">a<\/span><span class=\"NormalTextRun SCXW178939269 BCX0\"> basic understanding of classical cryptographic tools and advanced concepts <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">of programmable<\/span><span class=\"NormalTextRun SCXW178939269 BCX0\"> cryptography<\/span> <span class=\"NormalTextRun SCXW178939269 BCX0\">such as<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">Zero<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">Knowledge<\/span><span class=\"NormalTextRun SCXW178939269 BCX0\">, ZK), <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">homomorphic<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">encription<\/span><span class=\"NormalTextRun SCXW178939269 BCX0\">  (<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">Fully<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">Homomorphic<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">Encryption<\/span><span class=\"NormalTextRun SCXW178939269 BCX0\">, FHE) and<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">Multi<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">Party<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW178939269 BCX0\">Computation<\/span><span class=\"NormalTextRun SCXW178939269 BCX0\">, MPC). In the concluding section,  <\/span>we focus on analyzing the risks that quantum computers pose to today&#8217;s cryptography.<\/span><span class=\"EOP SCXW178939269 BCX0\" data-ccp-props=\"{\"201341983\":0,\"335559739\":0,\"335559740\":240}\"> <\/span><\/p>\n","protected":false},"author":6,"featured_media":6194,"template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[108,171,106],"class_list":["post-6226","tribe_events","type-tribe_events","status-publish","has-post-thumbnail","hentry","tribe_events_cat-all","tribe_events_cat-cyptography","tribe_events_cat-security","cat_all","cat_cyptography","cat_security"],"acf":[],"_links":{"self":[{"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events\/6226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":1,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events\/6226\/revisions"}],"predecessor-version":[{"id":6230,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events\/6226\/revisions\/6230"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/media\/6194"}],"wp:attachment":[{"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/media?parent=6226"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tags?post=6226"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ict-academy.si\/en\/wp-json\/wp\/v2\/tribe_events_cat?post=6226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}