A Survey of Tools and Techniques connecting Quantum Computing with Blockchain Technology - Includes a Demo on Quantum Resistant Ledger ( QRL ) and a Deep Dive on Quantum Assistant Blockchain, Quantum Secure Blockchain, Quantum Entangled Blockchain and Quantum Blockchain using Hamiltonian Optimisers. Presented in the Global FinTech Conference 2019 held at Delhi University, Co-Organized by Ramanujan College, Python India, ZCash India, Hyperledger Telecom SIG, Delhi / NCR Chapter.
High Secure Password Authentication SystemAkhil Nadh PC
Muti Server Password Authentication system. Split the password and store it in multiple server for increasing the degree of security of the data. The technique is used in storing the login information securely
INFOCOM CNERT 2018 - Best demo award
The CityLab Testbed - Large-scale Multi-technology Wireless Experimentation in a City Environment: Neural Network-based Interference Prediction in a Smart City
Logs Are Magic: Why Git Workflows and Commit Structure Should Matter To YouJohn Anderson
Git is a powerful, critical, yet poorly understood tool that virtually all Open Source developers use. One of the key features that git provides is a powerful and comprehensive log that displays the history of all the changes that have happened in a project, including potential developments that weren't ever merged, details about former versions of software that can inform future development, and even such mundane details as whether development on feature A started before or after development of bugfix B.
Despite the power and utility of git's log, few developers take full advantage of it. Worse, some common practices that developers have adopted in the name of convenience (or just plain cargo culting) can actually destroy this useful information. Moreover, if developers are following the common exhortation to "commit often", they may end up with logs full of uninteresting noise, as all the details of debugging attempts and experiments are inadvertently recorded.
This talk will:
* detail the potential benefits of having informative and well structured logs
* discuss common developer habits that can make logs less useful
* explain techniques to preserve informative development history
Now that IPv6 is being actively deployed around the world, security is more and more a growing concern. Unfortunately, there are still a large number of myths that plague the IPv6 security world. Things that people state as facts which simply are not true. This fun, fast-paced talk debunks the most common of those IPv6 security myths and provides a quick introduction to IPv6 security along the way.
High Secure Password Authentication SystemAkhil Nadh PC
Muti Server Password Authentication system. Split the password and store it in multiple server for increasing the degree of security of the data. The technique is used in storing the login information securely
INFOCOM CNERT 2018 - Best demo award
The CityLab Testbed - Large-scale Multi-technology Wireless Experimentation in a City Environment: Neural Network-based Interference Prediction in a Smart City
Logs Are Magic: Why Git Workflows and Commit Structure Should Matter To YouJohn Anderson
Git is a powerful, critical, yet poorly understood tool that virtually all Open Source developers use. One of the key features that git provides is a powerful and comprehensive log that displays the history of all the changes that have happened in a project, including potential developments that weren't ever merged, details about former versions of software that can inform future development, and even such mundane details as whether development on feature A started before or after development of bugfix B.
Despite the power and utility of git's log, few developers take full advantage of it. Worse, some common practices that developers have adopted in the name of convenience (or just plain cargo culting) can actually destroy this useful information. Moreover, if developers are following the common exhortation to "commit often", they may end up with logs full of uninteresting noise, as all the details of debugging attempts and experiments are inadvertently recorded.
This talk will:
* detail the potential benefits of having informative and well structured logs
* discuss common developer habits that can make logs less useful
* explain techniques to preserve informative development history
Now that IPv6 is being actively deployed around the world, security is more and more a growing concern. Unfortunately, there are still a large number of myths that plague the IPv6 security world. Things that people state as facts which simply are not true. This fun, fast-paced talk debunks the most common of those IPv6 security myths and provides a quick introduction to IPv6 security along the way.
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerGokul Alex
Lecture presented on Quantum Computing Workshop organised by Government of West Bengal Department of Information Technology on October 2018. This presentation explores the differences between Quantum Cryptography, Post Quantum Cryptography and outlines the fundamentals of Zero Knowledge Proof Protocols and how Quantum Information can redefine the landscape of Proof Systems in general and Zero Knowledge Proof in specific context.
Post Quantum Cryptography - Emerging FrontiersGokul Alex
Emerging frontiers in Post Quantum Cryptography such as Lattice based Cryptography, Code based Cryptography, Super Elliptical Curve Isogeny based Cryptography etc. and an introduction into Zero Knowledge Proof.
Blockchain Scalability - Themes, Tools and TechniquesGokul Alex
This presentation is a deep dive on Blockchain Scalability Challenges, Constraints with a narrative on promising techniques such as State Channel, Side Chains, Simple Payment Vehicles, Consensus Algorithms and Directed Acyclic Graphs. The presentation starts with analysing the scalability cube.
Hydro Mining - Mining Bitcoin and other Cryptocurrencies with hydroelectric p...Michele Mostarda
This presentation introduces the basic concepts around Bitcoin and the main Cryptocurrencies, focusing on the opportunity of mining for small/medium sized producers of hydroelectric power.
A Deep Dive into the Interplay of Cryptographic Schemes and Algorithms powering the state of the art security models in Blockchain as manifested by the legendary Cryptocurrency Scheme Bitcoin. Presented in the IT Audit and Cybersecurity Conclave Organised by ISACA and Red Team Hacker Academy in Kochi, Kerala.
4Developers 2015: Measure to fail - Tomasz KowalczewskiPROIDEA
YouTube: https://www.youtube.com/watch?v=H5F0D55nKX4&index=11&list=PLnKL6-WWWE_WNYmP_P5x2SfzJ7jeJNzfp
Tomasz Kowalczewski
Language: English
Hardware fails, applications fail, our code... well, it fails too (at least mine). To prevent software failure we test. Hardware failures are inevitable, so we write code that tolerates them, then we test. From tests we gather metrics and act upon them by improving parts that perform inadequately. Measuring right things at right places in an application is as much about good engineering practices and maintaining SLAs as it is about end user experience and may differentiate successful product from a failure.
In order to act on performance metrics such as max latency and consistent response times we need to know their accurate value. The problem with such metrics is that when using popular tools we get results that are not only inaccurate but also too optimistic.
During my presentation I will simulate services that require monitoring and show how gathered metrics differ from real numbers. All this while using what currently seems to be most popular metric pipeline - Graphite together with com.codahale metrics library - and get completely false results. We will learn to tune it and get much better accuracy. We will use JMeter to measure latency and observe how falsely reassuring the results are. We will check how graphite averages data just to helplessly watch important latency spikes disappear. Finally I will show how HdrHistogram helps in gathering reliable metrics. We will also run tests measuring performance of different metric classes
Hardware fails, applications fail, our code... well, it fails too (at least mine). To prevent software failure we test. Hardware failures are inevitable, so we write code that tolerates them, then we test. From tests we gather metrics and act upon them by improving parts that perform inadequately. Measuring right things at right places in an application is as much about good engineering practices and maintaining SLAs as it is about end user experience and may differentiate successful product from a failure.
In order to act on performance metrics such as max latency and consistent response times we need to know their accurate value. The problem with such metrics is that when using popular tools we get results that are not only inaccurate but also too optimistic.
During my presentation I will simulate services that require monitoring and show how gathered metrics differ from real numbers. All this while using what currently seems to be most popular metric pipeline - Graphite together with metrics.dropwizard.io library - and get completely false results. We will learn to tune it and get much better accuracy. We will use JMeter to measure latency and observe how falsely reassuring the results are. Finally I will show how HdrHistogram helps in gathering reliable metrics. We will also run tests measuring performance of different metric classes.
Quantum Computing - A History in the Making Gokul Alex
Please find my key note lecture on Quantum Computing presented at the RedTeam Security Summit 2019 in North Kerala at Malabar in Calicut City. This session is a survey on the history of Quantum Computing from early 1960's to the recent Quantum Supremacy experiment done by Google along with University of Santa Barbara. It captures the history from conjugate coding to sycamore processor succinctly. It also captures the essence of post quantum cryptography and quantum algorithms.
This presentation gives a lot of insights into Jimdo's infrastructure that hosts 20 million websites. To enable our application developers to quickly launch and improve their services, we've created a platform called Wonderland that does all the infrastructure work them.
In this talk, I present the parts of Wonderland related to monitoring and logging. You can learn about our Prometheus setup as well as how we stream log messages from Docker to Logstash.
This talk provides an introduction to various concepts that are essential to the understanding of distributed systems. Concepts covered include the 8 fallacies of distributed computing, the anatomy of a distributed system, system models, the CAP theorem, consistency models, partitioning, replication, leader election, failure detection, and consensus algorithms. This is the first in a three-part series designed to familiarize the audience with the design and usage of distributed systems.
When your job is to act as a malicious attacker on a daily basis for the good of helping organizations, you can’t help but wonder “What if I decided to embrace the evil within?” What if one day I woke up evil? Every day as a pentester, I compromise organizations through a variety of ways. If I were to wake up one day and decide to completely throw my ethics out the window, how profitable could I be, and could I avoid getting caught?
In this talk I will walk through a detailed methodology about how I personally would go about exploiting organizations for fun and profit, this time not under the “white hat.” Non-attribution, target acquisition, exploitation, and profitization will be the focal points. Blue teamers will get a peek into the mindset of a dedicated attacker. Red teamers will learn a few new techniques for their attack methodologies.
Encryption Basics Everyone Should KnowJason Truppi
Encryption is a core component to security and a product of strong cryptography. What should you know as a casual user of the Internet, digital wallets or as an application developer.
Blockchain Technology in Banking Services - A ReviewGokul Alex
My session for IIM Bengaluru for the Executive Leaders of Public Sector Banks in India about the principles, paradigms, platforms, protocols and potentials of Blockchain Technology in 2020.
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFGokul Alex
DEFCON is is one of the world's largest and most notable hacker conventions in the world. It an esoteric experience of an elusive kind. It is a daring dream to destroy the dystopian darkness of super surveillance states. Here we are presenting our passion for Blockchain Security in DEFCON 28, based on the theme - 'Preventing DDoS Attacks on Ethereum 2.0 using Verifiable Delay Function Powered Authentication Architectures'. When we teamed up together a month ago, we never ever imagined that we will march into the league of extraordinary hackers to present our beloved blockchain security models in-front of the pioneers and paragons in the security space. We are grateful to all our well wishers in Governments, Private Sector, Academic Institutions, Think Tanks, Research Organisations across the world who has inspired us to deep dive on the creative convergence of cryptography and consensus algorithms to weave this world together. Our session is part of the Block Village stream in the DEFCON 28. Please find further details of the event in the Block Village portal. https://www.blockchainvillage.net/schedule2020
#defcon2020 #defcon28 #cybersecurity #ethereum #blockvillage #blockchainsecurity #blockchainaudit
More Related Content
Similar to Quantum Meets Blockchain - Different Perspectives
Quantum Knowledge Proofs and Post Quantum Cryptography - A PrimerGokul Alex
Lecture presented on Quantum Computing Workshop organised by Government of West Bengal Department of Information Technology on October 2018. This presentation explores the differences between Quantum Cryptography, Post Quantum Cryptography and outlines the fundamentals of Zero Knowledge Proof Protocols and how Quantum Information can redefine the landscape of Proof Systems in general and Zero Knowledge Proof in specific context.
Post Quantum Cryptography - Emerging FrontiersGokul Alex
Emerging frontiers in Post Quantum Cryptography such as Lattice based Cryptography, Code based Cryptography, Super Elliptical Curve Isogeny based Cryptography etc. and an introduction into Zero Knowledge Proof.
Blockchain Scalability - Themes, Tools and TechniquesGokul Alex
This presentation is a deep dive on Blockchain Scalability Challenges, Constraints with a narrative on promising techniques such as State Channel, Side Chains, Simple Payment Vehicles, Consensus Algorithms and Directed Acyclic Graphs. The presentation starts with analysing the scalability cube.
Hydro Mining - Mining Bitcoin and other Cryptocurrencies with hydroelectric p...Michele Mostarda
This presentation introduces the basic concepts around Bitcoin and the main Cryptocurrencies, focusing on the opportunity of mining for small/medium sized producers of hydroelectric power.
A Deep Dive into the Interplay of Cryptographic Schemes and Algorithms powering the state of the art security models in Blockchain as manifested by the legendary Cryptocurrency Scheme Bitcoin. Presented in the IT Audit and Cybersecurity Conclave Organised by ISACA and Red Team Hacker Academy in Kochi, Kerala.
4Developers 2015: Measure to fail - Tomasz KowalczewskiPROIDEA
YouTube: https://www.youtube.com/watch?v=H5F0D55nKX4&index=11&list=PLnKL6-WWWE_WNYmP_P5x2SfzJ7jeJNzfp
Tomasz Kowalczewski
Language: English
Hardware fails, applications fail, our code... well, it fails too (at least mine). To prevent software failure we test. Hardware failures are inevitable, so we write code that tolerates them, then we test. From tests we gather metrics and act upon them by improving parts that perform inadequately. Measuring right things at right places in an application is as much about good engineering practices and maintaining SLAs as it is about end user experience and may differentiate successful product from a failure.
In order to act on performance metrics such as max latency and consistent response times we need to know their accurate value. The problem with such metrics is that when using popular tools we get results that are not only inaccurate but also too optimistic.
During my presentation I will simulate services that require monitoring and show how gathered metrics differ from real numbers. All this while using what currently seems to be most popular metric pipeline - Graphite together with com.codahale metrics library - and get completely false results. We will learn to tune it and get much better accuracy. We will use JMeter to measure latency and observe how falsely reassuring the results are. We will check how graphite averages data just to helplessly watch important latency spikes disappear. Finally I will show how HdrHistogram helps in gathering reliable metrics. We will also run tests measuring performance of different metric classes
Hardware fails, applications fail, our code... well, it fails too (at least mine). To prevent software failure we test. Hardware failures are inevitable, so we write code that tolerates them, then we test. From tests we gather metrics and act upon them by improving parts that perform inadequately. Measuring right things at right places in an application is as much about good engineering practices and maintaining SLAs as it is about end user experience and may differentiate successful product from a failure.
In order to act on performance metrics such as max latency and consistent response times we need to know their accurate value. The problem with such metrics is that when using popular tools we get results that are not only inaccurate but also too optimistic.
During my presentation I will simulate services that require monitoring and show how gathered metrics differ from real numbers. All this while using what currently seems to be most popular metric pipeline - Graphite together with metrics.dropwizard.io library - and get completely false results. We will learn to tune it and get much better accuracy. We will use JMeter to measure latency and observe how falsely reassuring the results are. Finally I will show how HdrHistogram helps in gathering reliable metrics. We will also run tests measuring performance of different metric classes.
Quantum Computing - A History in the Making Gokul Alex
Please find my key note lecture on Quantum Computing presented at the RedTeam Security Summit 2019 in North Kerala at Malabar in Calicut City. This session is a survey on the history of Quantum Computing from early 1960's to the recent Quantum Supremacy experiment done by Google along with University of Santa Barbara. It captures the history from conjugate coding to sycamore processor succinctly. It also captures the essence of post quantum cryptography and quantum algorithms.
This presentation gives a lot of insights into Jimdo's infrastructure that hosts 20 million websites. To enable our application developers to quickly launch and improve their services, we've created a platform called Wonderland that does all the infrastructure work them.
In this talk, I present the parts of Wonderland related to monitoring and logging. You can learn about our Prometheus setup as well as how we stream log messages from Docker to Logstash.
This talk provides an introduction to various concepts that are essential to the understanding of distributed systems. Concepts covered include the 8 fallacies of distributed computing, the anatomy of a distributed system, system models, the CAP theorem, consistency models, partitioning, replication, leader election, failure detection, and consensus algorithms. This is the first in a three-part series designed to familiarize the audience with the design and usage of distributed systems.
When your job is to act as a malicious attacker on a daily basis for the good of helping organizations, you can’t help but wonder “What if I decided to embrace the evil within?” What if one day I woke up evil? Every day as a pentester, I compromise organizations through a variety of ways. If I were to wake up one day and decide to completely throw my ethics out the window, how profitable could I be, and could I avoid getting caught?
In this talk I will walk through a detailed methodology about how I personally would go about exploiting organizations for fun and profit, this time not under the “white hat.” Non-attribution, target acquisition, exploitation, and profitization will be the focal points. Blue teamers will get a peek into the mindset of a dedicated attacker. Red teamers will learn a few new techniques for their attack methodologies.
Encryption Basics Everyone Should KnowJason Truppi
Encryption is a core component to security and a product of strong cryptography. What should you know as a casual user of the Internet, digital wallets or as an application developer.
Blockchain Technology in Banking Services - A ReviewGokul Alex
My session for IIM Bengaluru for the Executive Leaders of Public Sector Banks in India about the principles, paradigms, platforms, protocols and potentials of Blockchain Technology in 2020.
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDFGokul Alex
DEFCON is is one of the world's largest and most notable hacker conventions in the world. It an esoteric experience of an elusive kind. It is a daring dream to destroy the dystopian darkness of super surveillance states. Here we are presenting our passion for Blockchain Security in DEFCON 28, based on the theme - 'Preventing DDoS Attacks on Ethereum 2.0 using Verifiable Delay Function Powered Authentication Architectures'. When we teamed up together a month ago, we never ever imagined that we will march into the league of extraordinary hackers to present our beloved blockchain security models in-front of the pioneers and paragons in the security space. We are grateful to all our well wishers in Governments, Private Sector, Academic Institutions, Think Tanks, Research Organisations across the world who has inspired us to deep dive on the creative convergence of cryptography and consensus algorithms to weave this world together. Our session is part of the Block Village stream in the DEFCON 28. Please find further details of the event in the Block Village portal. https://www.blockchainvillage.net/schedule2020
#defcon2020 #defcon28 #cybersecurity #ethereum #blockvillage #blockchainsecurity #blockchainaudit
Digital Innovation and Dynamics of Entrepreneurship Gokul Alex
Presentation by Gokul Alex on the Dynamics of Entreprenship and how Digital Innovation powers the journey into business mastery. He has presented this session for the Career Guidance Unit of Sarabhai Institute of Science and Technology, Trivandrum.
Decentralised AI and Distributed Ledgers - An IntroductionGokul Alex
The presentation on Decentralised Machine Intelligence powered by Distributed Ledgers from Gokul Alex in the 3AI Association Thought Leadership Forum Webinar Series. An introduction to Ocean Protocol, Raven Protocol, SingularityNET and reference architectures of decentralised machine intelligence.
R3Corda - Architecture Overview - Concepts and ComponentsGokul Alex
All India Council for Technical Education AICTE India has organised a Short Term Training Program (STTP) on Blockchain Technology for Engineering Educators across India over in this week. It was an exciting event for us in working on the convergence of academia and industry. Thanks to the support from 'The Blockchain Network' (TBN), I could present a couple of protocol and platform deep dive sessions on Hyperledger Fabric and R3 Corda. Please find the compilation of concepts and components that we have discussed on R3 Corda in this session in the attached document. Request your views and comments!
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsGokul Alex
Presentation Session by Gokul Alex for Tamil Nadu Science Foundation on the Collection of Cryptographic Techniques for COVID-19 Contact Tracing in the framework of Privacy Preserving Proximity Protocols. This is a research report compiled in collaboration with EPIC Knowledge Society, RedTeam Hacker Academy, Beyond Identity, Semiot Protocols, Cyanaura Maps.
Cybersecurity Context in African Continent - Way ForwardGokul Alex
The slides from the presentation session by Gokul Alex on the Enigmatic Economy of Cyber Crimes and Cyber Attacks across the globe with the specific focus on African Continent ravaging countries such as South Africa, Nigeria, Kenya, etc. Cybersecurity issues are looming large and assuming larger significance in the post pandemic political economies. This presentation was delivered to the TAFFD Virtual Conference on Cybersecurity in July 2020 together with Red Team Hacker Academy and BeyondIdentity.
Creative Careers for Post Pandemic TimesGokul Alex
A lecture on the creative careers for the post-pandemic times by Gokul Alex, founder of EPIC Knowledge Society for the Webinar Organised by Teknowledge Edutainers with the focus on understanding the rise of societal technology infrastructure in the pandemic times and foreseeing the emerging trends in technology in the post-pandemic times in areas such as AI, Analytics, Blockchain, Privacy, Geospatial Analytics, Biohacking, Bioinformatics, Drones, Internet of Things, Privacy Preserving Protocols, Robotics etc. This presentation is envisioning a convergent and connected technology infrastructure with the focus of social entrepreneurship and digital health in recent times.
Imagining Intelligent Information Machines for 2020Gokul Alex
A Strategic Roadmap for Artificial Intelligence in Social Sector considering the challenges and constraints of 2020. A survey of global reference case studies, key pillars, maturity models, growth markets, revenue projections, use cases etc.
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...Gokul Alex
This is an Executive Leadership Workshop Program by Gokul Alex on the fundamentals and frontiers of Blockchain which is a transformative technology covering key concepts such as value proposition design, competitive advantage, operating models, value streams, architecture frameworks etc. It is a distillation of essential concepts and emerging frontiers in the world of distributed ledger technologies.
A Concise Introduction to Cryptographic ConceptsGokul Alex
A Concise Introduction to Cryptographic Concepts by Gokul Alex in the ALTERED 2020 Virtual Conference Organised by IEEE Kerala Section in MBCET. This session covers the historic emergence of cryptographic schemes such as Ceaser Cipher, Substitution Cipher, Transposition Cipher, Vigenre Cipher, Vernam Cipher, One Time Pad, RSA, Diffie Hellman, Elliptic Curves, Hash Algorithms etc.
Applying Blockchain Technology for Digital TransformationGokul Alex
My virtual webinar session on applying Blockchain Technology for Digital Transformation of Contemporary Business Models in the UL Talks Series organised by ULTS, the IT Subsidiary of ULCCS. This presentation is a journey through the basic concepts of Blockchain Technology and a compilation of interesting business cases around Blockchain Technology.
Cognitive Commerce powered by Creative Convergence of AI, Analytics and Autom...Gokul Alex
Key Note Address by Gokul Alex in the Estuary 2020 Event organised by Indian Maritime University in Chennai on the theme of E-Commerce and Digital Technologies.
Decentralised AI through Distributed Ledger Technologies Gokul Alex
My seminar lecture session on Decentralised AI through Distributed Ledger Technologies in the second National Seminar on Machine Intelligence organised by University of Kerala, Department of Computer Science on 24th January 2020. I have covered the foundations of distributed ledger technologies, decentralisation roadmap, decentralised AI and decentralised data exchanges in this session.
Cloud Security Engineering - Tools and TechniquesGokul Alex
Cloud Security Engineering Education Materials prepared by Gokul Alex. It covers the essential tools and techniques to protect cloud enterprise architectures and cloud information systems.
Cloud Security - Emerging Facets and FrontiersGokul Alex
My session on Cloud Computing Security prepared for ISC2 Bangalore Chapter MeetUp. It is a walkthrough on the fundamental axioms of cloud security with reference to architecture standards, industry best practices and a coverage of some of the most pertinent attack vectors in the recent times. This presentation delves deeper into Cloud Security Reference Architectures, Cloud Security Operating Models, Cloud Firewalls, Cloud Identity Access Management Models, Cloud Malware Concepts etc.
Introduction to Blockchain Business ModelsGokul Alex
From my presentation on Blockchain Business Models delivered at World Trade Centre, Bengaluru. This session was a deep dive on Business Modelling Techniques and their relevance to Blockchain Projects and Platforms. Business Model Canvas is tailor made for various blockchain engagements. I have compiled a collection of 20 business models around blockchain in this deck.
Introduction to Blockchain Governance ModelsGokul Alex
The presentation on the history and emergence of distributed consensus and the contemporary aspects of Blockchain Governance presented for the Global FinTech and Blockchain Forum organised by Pyramid Learning Platforms.
Generational Adversarial Neural Networks - Essential ReferenceGokul Alex
My presentation on Generational Adversarial Neural Networks and the Challenges of Adversarial Learning Conditions in Neural Networks presented during the National Symposium on Machine Intelligence organised by Kerala University in 2017 in Thiruvananthapuram.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Quantum Meets Blockchain - Different Perspectives
1. Q U A N T U M M E E T S B L O C K C H A I N
A U T O N O M O U S N AT U R E I N C O N F L U E N C E W I T H A U T O N O M O U S N E T W O R K S
2. Q K D
C N O T G AT E
C C N O T G AT E
PA U L I G AT E
T O F F O L I G AT E
S WA P G AT E
H A D A M A R D T R A N S F O R M
K E Y W O R D S
3. Q U B I T
Q U D I T S
Q R N G
B E L L S TAT E
G H Z S TAT E
E N TA N G L E M E N T
S U P E R P O S I T I O N
S H O R A L G O R I T H M
G R O V E R A L G O R I T H M
K E Y W O R D S
4. Q U A N T U M M O N E Y
Q U A N T U M S E C U R E B L O C K C H A I N
Q U A N T U M A S S I S T E D B L O C K C H A I N
Q U A N T U M R E S I S TA N T B L O C K C H A I N
Q U A N T U M E N TA N G L E D B L O C K C H A I N
Q U A N T U M O P T I M I Z E D B L O C K C H A I N
P E R S P E C T I V E S
5. Q U A N T U M M O N E Y
• Design of bank notes making them
impossible to forge through quantum
mechanical techniques
• Stephen Wiesner, a graduate student
in Columbia University proposed the
idea in 1970. It remained
unpublished till 1983.
• Each bank note will have a unique
serial number connected to an
isolated two state quantum systems
6.
7.
8.
9.
10.
11.
12.
13.
14. S H O R ’ S A L G O R I T H M C I R C U I T M O D E L
15.
16. Q U A N T U M S U B R O U T I N E S H O R A L G O R I T H M
17.
18. Q U A N T U M C I R C U I T F O R S H O R ’ S A L G O R I T H M
19.
20.
21. G R O V E R ’ S A L G O R I T H M - O R A C L E C I R C U I T
22. G R O V E R ’ S A L G O R I T H M - P H A S E G AT E C I R C U I T
23. S T E P S I N G R O V E R ’ S
A L G O R I T H M
• Place a register in an equal
superposition of all states
• Selectively invert the phase of the
marked state
• Inversion about the mean operation
a number of times
24.
25.
26.
27.
28. Q U A N T U M
S E C U R I T Y
• Position based Quantum
Cryptography
• Device Independent Quantum
Cryptography
• Post Quantum Cryptography
29. P O S T Q U A N T U M C RY P T O G R A P H Y
A S U R V E Y O F E M E R G I N G A L G O R I T H M S A N D C O N C E P T S
30. P R O M I N E N T P Q C
S C H E M E S
• Lattice based cryptography
• Multivariate cryptography
• Hash based cryptography
• Code based cryptography
• Supersingular Elliptic Curve Isogeney
Cryptography
• Symmetric Key Quantum Resistance
31.
32.
33. Q U A N T U M R E S I S TA N T L E D G E R
A P O S T- Q U A N T U M S E C U R E B L O C K C H A I N F E AT U R I N G A S TAT E F U L S I G N AT U R E S C H E M E
34. Q U A N T U M
R E S I S TA N T L E D G E R
• Python based Blockchain Ledger
utilising hash based one-time Merkle
Tree signature scheme instead of
ECDSA.
• Proof of work selection via the
cryptonight algorithm
• Both PoW and PoW available on
TestNet
• Ephemeral Messaging and Smart
Contract Integration in the roadmap
38. Q U A N T U M AT TA C K S O N B I T C O I N
D I V E S H A G G A R WA L , 1 , 2 G AV I N K . B R E N N E N , 3 T R O Y L E E , 4 , 2 M I K L O S S A N T H A , 5 , 2 A N D M A R C O
T O M A M I C H E L : N U S , C Q T, N T U , U N I V E R S I T Y O F S Y D N E Y
39. By most optimistic estimates, as early as 2027, a quantum computer
could exist that can break elliptic curve signature scheme in less than
10 minutes, the block time used in Bitcoin
40. Q U A N T U M C H A L L E N G E S
T O B L O C K C H A I N
T E C H N O L O G Y
• Digital Signature
• Cryptographic Hash Functions
41. B I T C O I N
E S S E N T I A L S
• In Bitcoin, the hash function chosen for the
proof of work is two sequential applications of
SHA 256.
• As the size of the range of h is 2^256, the
expected number of hashes that need to be
tried to accomplish the hashcash proof of work
with parameter t is 2^256/t.
• In Bitcoin proof of work, it is specified in terms
of the difficulty D where D = 2 ^ 224 / t.
• This is the expected number of hashes needed
to complete the proof of work divided by 2 ^
32, the number of available nonces.
42. T H E D I F F I C U LT Y I S T H E E X P E C T E D N U M B E R O F VA R I AT I O N S O F
T R A N S A C T I O N S A N D T I M E S TA M P S T H AT N E E D T O B E T R I E D
W H E N H A S H I N G B L O C K H E A D E R S , W H E N F O R E A C H F I X I N G O F
T H E T R A N S A C T I O N S A N D T I M E S TA M P S A L L N O N C E S A R E T R I E D
D E F I N I N G D I F F I C U LT Y
43. G R O V E R A L G O R I T H M
A N D P R O O F O F W O R K
• Using Grover’s search, a quantum computer can
perform the hashcash POW by performing
quadratically fewer hashes than is needed by a
classical computer.
• However, the extreme speed of current ASIC
hardware for performing the hashcash POW,
coupled with much slower projected gate
speeds of current quantum architectures
negates this quadratic speedup
• Quantum gate speeding upto 100 GHZ could
allow quantum computers to solve the POW
about 100 times faster than the current
technology
44. Q U A N T U M S E C U R E D
B L O C K C H A I N T E C H N O L O G Y
E . O . K I K T E N K O , 1 , 2 N . O . P O Z H A R , 1 M . N . A N U F R I E V, 1 A . S . T R U S H E C H K I N , 1 , 2 R . R . Y U N U S O V, 1 Y. V. K U R O C H K I N , 1
A . I . LV O V S K Y, 1 , 3 , ∗ A N D A . K . F E D O R O V 1 - R U S S I A N Q U A N T U M C E N T E R , U N I V E R S I T Y O F C A L G A RY
45. B L O C K C H A I N A N D
C RY P T O G R A P H Y
• Blockchain relies on two one way
computational methods
• Cryptographic Hash Functions
• Digital Signatures
• Most Blockchain platforms rely on
ECDSA or RSA to generate the
digital signature
46. S H O R ’ S A N D G R O V E R ’ S
A L G O R I T H M S
• Shor’s quantum algorithm solves
factorisation of large numbers and
discrete logarithms in polynomial time
• Grover’s search algorithm allows a
quadratic speedup in calculating the
inverse hash functions
• This will enable the 51% attack in which a
syndicate of malicious parties controlling
a majority of the network’s computing
power to monopolise mining of new
blocks
47. B L O C K C H A I N
S E C U R I T Y A N D P Q C
• Security of blockchains can be
enhanced by using post quantum
digital signature schemes for signing
transactions
• However post quantum signatures
are computationally intensive and
not helpful against attacks that utilise
the quantum computer to dominate
the netowks mining hash rate.
48. Q U A N T U M K E Y
D I S T R I B U T I O N
• Quantum Key Distribution for
Authentication
• QKD is able to generate a secret key
between two parties connected by a
quantum channel ( for transmitting
quantum states ) and a public classic
channel ( for post processing
procedures )
49. Q K D B A S E D D I G I TA L
S I G N AT U R E G E N E R AT I O N
• QKD requires an authenticated
classical channel for operation
• Each QKD session generates a large
amount of shard secret data, part of
which can be used for authentication
in subsequent sessions
• Small amount of seed secret data that
parties share before the first QKD
session ensures secret authentication
for all future communications
50. Q U A N T U M S E C U R E
B L O C K C H A I N
A R C H I T E C T U R E
• Blockchain Protocol with a two layer
network with n-nodes
• First layer is a QKD network with
pairwise communication channel
• Second layer is used for transmitting
messages with authentication tags
based on Toeplitz hashing that are
created using the private keys
procured in the first layer
51. U N I Q U E
T E C H N I Q U E S
• Block proposal by miners are not
required as it is vulnerable to quantum
computer attacks
• Transactions are not rigged with digital
signatures. Miners have complete
freedom to fabricate aribitrarily,
apparently valid
• Nodes equipped with Quantum
Computer is able to mine new blocks
dramatically faster than any non-quantum
node.
52. B R O A D C A S T
P R O T O C O L
• Proposed by Shostak, Lamport and Pease
• Able to achieve Byzantine Final Agreement in any
network with pairwise authentication
communication provided that the number of
dishonest parties is less than n/3
• Each node forms a block out of all admissible
transactions sorted according to their timestamps
• Broadcast protocol is relatively data intensive, the
data need not be transmitted through quantum
channels.
• Quantum channels are only required to generate
Private Keys.
53. G R O V E R S A L G O R I T H M
AT TA C K O N B L O C K C H A I N
• Malicious party equipped with a quantum
computer can work offline to forge the
database
• They can change one of the past transaction
record and performs a Grover search for a
variant of other transactions with the same
block such that its hash remains the same, to
make the forged version appear legitimate.
• Once the search is successful, it hacks into all
or some of the network nodes and
substitutes the legitimate database by its
forged version
54. G R O V E R S A L G O R I T H M
AT TA C K O N B L O C K C H A I N
• Potential of this attack to cause serious
damage appears low, because the attacker
would need to simultaneously hack into one
third of the nodes to alter the consensus.
• Grover’s algorithm offers only a quadratic
speedup with respect to classical search
algorithms
• Hence this attack can be prevented by
increasing the convention on the block hash
to about a square of its safe non-quantum
value.
55. Q U A N T U M A S S I S T E D
B L O C K C H A I N T E C H N O L O G Y
D . S A PA E V 1 , 3 , D . B U LY C H K O V 2 , 3 , F. A B L AY E V 3 , A . VA S I L I E V 3 , M . Z I AT D I N O V 3
56. G R O V E R ’ S A L G O R I T H M
A N D P R O O F O F W O R K
• Quantum Computers can perform an
exhaustive search quadratically faster
than classical computers
• We can use modified Grovers
Algorithm to perform mining on
Quantum Computers
• If we can consider all the values of
nonce at once, then we can speedup
the search for the right one
57. Q U A N T U M R E G I S T E R
D E S I G N O V E R V I E W
• Dividing a Quantum Register
• Applying Hadamard Transform to the
Qubits
• Considering all values at once
• Functional Qubit for Grovers
Algorithm
58. Q U A N T U M R E G I S T E R
C O M P U TAT I O N
• Applying Hadamard Transform to the
nonce quibits. Calculate the Hash Values
for all the nonce values at once
• For each incoming block header, mix it
with the hash state and then compute
the hash function
• We get a register that contains all values
of nonce, hash values for each nonce, a
number of service quibits that are
needed to store the intermediate
computations and a functional quibit
59. G R O V E R ’ S A L G O R I T H M
A N D N O N C E VA L U E
• We use the Oracle function to
calculate the hash value that is below
a certain threshold.
• This function is a NOT operation
controlled by those qubits whose
value is intended to be zero in the
desired hash value
• Apply Grover’s algorithm to find
desired hash value and nonce
60. C L A S S I C A L H A S H I N G
A L G O R I T H M S O N
Q U A N T U M C O M P U T E R S
• We need the following set of
primitives - XOR, AND, NOT and
bitwise shift
• XOR is implemented using CNOT
gate
• We need to write the result of an
XOR operation into separate Qubit
61. X O R O P E R AT I O N O N
T H E S E R V I C E Q U B I T
• Initialize the service qubit in the state | 0 >
• Perform a CNOT gate, in which the first
operand is the controlling one and the
service qubit is the target
• Perform the same transformation, but with
the second operand as the controlling
one
• Service Qubit will be in the state | 1 > if
and only if exactly one of the operand is 1,
otherwise it will be | 0 >
62. Q U A N T U M G AT E
I M P L E M E N TAT I O N
• AND is implemented using three bit
gate CCNOT - it inverts the target
qubit only when the first two are in
state | 1>
• NOT is implemented by a simple
Pauli Gate X
• Bit shift can be implemented using a
series of swap transformations
63. P R O B L E M S O F U S I N G
G R O V E R ’ S A L G O R I T H M
F O R M I N I N G
• Too low value for the average
• Grovers algorithm works efficiently
only if we have a uniform
superposition of all qubits
participating in it
64. Q U A N T U M B L O C K C H A I N U S I N G
E N TA N G L E M E N T I N T I M E
D E L R A J A N A N D M AT V I S S E R , V I C T O R I A U N I V E R S I T Y O F W E L L I N G T O N
65. C R U X
• Encoding Blockchain into a temporal
GHZ ( Greenberger - Home -
Zellinger ) state of photons that do
not simultaneously co-exist
• Entanglement involves nonclassical
correlations, usually between
spatially separated quantum systems
66. G H Z , B E L L S TAT E S A N D
S U P E R D E N S E C O D I N G
• Multipartite GHZ states are ones in
which all subsystems contribute to
the shared entangled property.
• Superdense Coding helps us to
convert classical information into
spatially entangled Bell states
• Bell States are orthonormal and
hence they can be distinguished by
quantum measurements
67. T E M P O R A L B E L L S TAT E S
A N D T I M E S TA M P I N G
• As records as generated, the system
encodes them as blocks into
temporal Bell states
• These photons are then created and
absorbed at their respective times
• To create the desired quantum
design, the system should chain the
bit strings of the Bell states together
in chronological order, through
entanglement in time
68. M A P P I N G B E L L S TAT E S
I N T O G H Z S TAT E
• Through a fusion process, temporal
Bell States are recursively projected
into a growing temporal GHZ state
• The time stamps allow each block’s
bit string to be differentiated from
the binary representation of the
temporal GHZ basis state
• Decoding process extracts the
classical information from the state
69. Q U A N T U M N E T W O R K
U S I N G R A N D O M I S E D
C O N S E N S U S
• Random Node selection using Quantum Random Number
Generator
• The untrusted source shares a possible valid block, an n-
qubit state.
• Since it knows the state, it can share as many copies of the
block as is needed without violating no-cloning theorem
• The verifying nodes generate random angles such that it is
a multiple of pi
• The classical angles are distributed to each node,
including the verifier
• If the n-qubit state was a valid block, i.e, a spatial GHZ
state, the necessary condition is satisfied with probability 1
70. Q U A N T U M B L O C K C H A I N W I T H P R O O F O F W O R K
B A S E D O N A N A L O G H A M I LT O N I A N O P T I M I S E R S
K I R I L L P. K A L I N I N 1
A N D N ATA L I A G . B E R L O F F, U N I V E R S I T Y O F C A M B R I D G E &
S K O L K O V O I N S T I T U T E O F S C I E N C E A N D T E C H N O L O G Y
71. P O W A N D H A S H
F U N C T I O N S
• Usually POW problems are based on a
function H, called hash function
• Hash y can be easily computed from the initial
data x by calculating y = H(x), but finding x
given a y is computationally hard
• The inversion of a hash function requires an
exponentially growing computational time or
an order of O(2^n) where n is the hash size.
• Every transaction in the block has a Hash
associated with it and each block in the
Blockchain is identified by its block header
hash
72. M I N I N G D I F F I C U LT Y
• The mining difficulty is represented by
the difficulty target value and dynamically
controlled and regularly adjusted by a
moving average giving an average
number of blocks per hour fixed in order
to compensate the increasing
computational power and varying interest
in running nodes involved in mining
• In bitcoin, the difficulty target is updated
every 2016 blocks in order to target the
desired block interval accurately
73. Q U A N T U M
S I M U L AT O R S
• Quantum simulator is an approach of using
one well tunable quantum system to
simulate another quantum system
• To design such a quantum simulator, one
needs to map the variables of the desired
Hamiltonian of the system into the
elements ( spins, currents, photons etc. ) of
the simulator, tune the interactions between
them, prepare the simulator in a state that
is relevant to the physical problem of
interest and perform measurements on the
simulator with the required precision
74. P H Y S I C A L S Y S T E M S F O R
Q U A N T U M S I M U L AT O R S
• Systems that use quantum processes for their operation
• Trapped Ions
• Superconducting Qubits
• Systems for which quantum processes are crucial in forming the
state of the system
• Bose Einstein Condensates
• Ultra cold atoms in optical lattices
• Network of optical parametric oscillators
• Coupled Lasers
• Polarisation Condensates
• Multimode Cavity QED
• Photon Condensates
75. Q U A N T U M O P T I M I S AT I O N
P R O B L E M S A N D P O W
• Universal Hamiltonians are NP-Hard
problems for a general matrix of couplings
• Number of operations grows as an
exponential function with the matrix size
• Hence we can formulate a spin
Hamiltonian for which the global minimum
can be found by a simulator
• Finding the optimal solution of the general
n vector model for a sufficiently large size
may be suitable for a POW protocol
76. Q U A N T U M O P T I M I S AT I O N
P R O B L E M S A N D P O W
• Two optimisation problems are
presented for POW
• Quadratic Unconstrained Binary
Optimisation ( QUBO )
• Quadratic Continuous
Optimisation ( QCO )
77. Q U A N T U M O P T I M I S AT I O N
P R O B L E M S A N D P O W
• Two optimisation problems are
presented for POW
• Quadratic Unconstrained Binary
Optimisation ( QUBO )
• Quadratic Continuous Optimisation
( QCO )
• QUBO is a discrete version of QCO for
which the decision variables are
constrained to lie on the unit circle with
is a continuous domain
78. – D AV I D D E U T S C H
“Quantum computation is … nothing less than a distinctly new way
of harnessing nature … It will be the first technology that allows
useful tasks to be performed in collaboration between parallel
universes, and then sharing the results.”