Webinar: Post-quantum cryptography (3)

Information

In this third session of the series, we return to the contrast between theory and practice: on paper, quantum computing creates significant security threats for grid operators. In reality, the technology is still taking its first steps and faces major implementation challenges, even if innovation is rapidly pushing it forward. Building on the previous parts of the series, we will now examine how these threats can be addressed through post-quantum cryptographic algorithms.