Quantum Key Distribution for Defence
Charlotte-Mary Venot QKD Engineer and Scientist
Expert lecture
Watch this full lecture and over 100 other expert presentations on quantum technologies with a QSECDEF membership.
About Charlotte-Mary Venot
Charlotte-Mary is a student of embedded systems at ISEP, a school of digital engineers in Paris.
As part of her degree Charlotte-Mary is conducting a three year internship at MBDA where she works on the improvement and development of effectors and effector systems using quantum technologies, notably in the field of communications.
She has been heavily embedded in the study of QKD use cases, leading to collaboration with Quantum Telecommunications Italy (QTI) to better apprehend and test their QKD devices. Charottle-Mary has real world experience garnered on a number of high profile QKD projects in EMEA.
Organisation
MBDA is the only European group capable of designing and producing missiles and missile systems to meet the whole range of current and future needs of the three armed forces.
Frequently Asked Questions
- Who is Charlotte-Mary Venot?
- Charlotte-Mary is a student of embedded systems at ISEP, a school of digital engineers in Paris. As part of her degree Charlotte-Mary is conducting a three year internship at MBDA where she works on the improvement and development of effectors and effector systems using quantum technologies,.
- What is the lecture "Quantum Key Distribution for Defence"?
- This presentation by Charlotte-Mary Venot at the Quantum Security Defence World Symposium covers key concepts, challenges, and developments in quantum cyber security, quantum key distribution.
- What is quantum cyber security?
- Quantum cyber security applies quantum mechanical principles to protect digital communications and data. It covers quantum key distribution, post-quantum cryptography, and quantum-safe network design.
- What is quantum key distribution?
- Quantum key distribution uses quantum mechanics to exchange cryptographic keys securely. Any interception disturbs the quantum states and is detectable, providing information-theoretic security.
Access All Expert Lectures
Watch over 100 expert presentations, attend weekly live webinars, and connect with specialists across 40+ countries.