
Sign up to save your podcasts
Or


This week, we welcome back Dustin Moody, a mathematician in the NIST Computer Security Division who teaches us about the risks posed by quantum computers and shares updates on the status of NIST's post-quantum cryptography standardization project. As quantum computers move from sci-fi to reality, Dustin elaborates on the functionality of quantum computing and shares best practices for protecting encrypted data to withstand evolving quantum capabilities. If you're interested in learning more about the four candidate algorithms for NIST's standardization project, visit their website at [nist.gov](https://www.nist.gov/ "").
Dustin Moody, Mathematician, NIST
Dustin Moody is a mathematician in the NIST Computer Security Division. Dustin leads the post-quantum cryptography project at NIST. He received his Ph.D. from the University of Washington in 2009. His area of research deals with elliptic curves and their applications in cryptography.
For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e218
By Forcepoint | Global Cybersecurity Leader | Security. Simplified.4.7
3939 ratings
This week, we welcome back Dustin Moody, a mathematician in the NIST Computer Security Division who teaches us about the risks posed by quantum computers and shares updates on the status of NIST's post-quantum cryptography standardization project. As quantum computers move from sci-fi to reality, Dustin elaborates on the functionality of quantum computing and shares best practices for protecting encrypted data to withstand evolving quantum capabilities. If you're interested in learning more about the four candidate algorithms for NIST's standardization project, visit their website at [nist.gov](https://www.nist.gov/ "").
Dustin Moody, Mathematician, NIST
Dustin Moody is a mathematician in the NIST Computer Security Division. Dustin leads the post-quantum cryptography project at NIST. He received his Ph.D. from the University of Washington in 2009. His area of research deals with elliptic curves and their applications in cryptography.
For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e218

229,029 Listeners

43,563 Listeners

373 Listeners

1,021 Listeners

318 Listeners

418 Listeners

8,522 Listeners

8,035 Listeners

181 Listeners

315 Listeners

74 Listeners

139 Listeners