
Sign up to save your podcasts
Or


This week, we welcome back Dustin Moody, a mathematician in the NIST Computer Security Division who teaches us about the risks posed by quantum computers and shares updates on the status of NIST's post-quantum cryptography standardization project. As quantum computers move from sci-fi to reality, Dustin elaborates on the functionality of quantum computing and shares best practices for protecting encrypted data to withstand evolving quantum capabilities. If you're interested in learning more about the four candidate algorithms for NIST's standardization project, visit their website at [nist.gov](https://www.nist.gov/ "").
Dustin Moody, Mathematician, NIST
Dustin Moody is a mathematician in the NIST Computer Security Division. Dustin leads the post-quantum cryptography project at NIST. He received his Ph.D. from the University of Washington in 2009. His area of research deals with elliptic curves and their applications in cryptography.
For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e218
By Forcepoint | Global Cybersecurity Leader | Security. Simplified.4.7
3939 ratings
This week, we welcome back Dustin Moody, a mathematician in the NIST Computer Security Division who teaches us about the risks posed by quantum computers and shares updates on the status of NIST's post-quantum cryptography standardization project. As quantum computers move from sci-fi to reality, Dustin elaborates on the functionality of quantum computing and shares best practices for protecting encrypted data to withstand evolving quantum capabilities. If you're interested in learning more about the four candidate algorithms for NIST's standardization project, visit their website at [nist.gov](https://www.nist.gov/ "").
Dustin Moody, Mathematician, NIST
Dustin Moody is a mathematician in the NIST Computer Security Division. Dustin leads the post-quantum cryptography project at NIST. He received his Ph.D. from the University of Washington in 2009. His area of research deals with elliptic curves and their applications in cryptography.
For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e218

229,965 Listeners

1,028 Listeners

10,951 Listeners

320 Listeners

419 Listeners

8,851 Listeners

8,110 Listeners

176 Listeners

315 Listeners

74 Listeners

139 Listeners