Henning Weier

Components for Space and Terrestrial QKD

Henning Weier Co-Founder

quantum cyber securityqkdqsat

Expert lecture

Watch this full lecture and over 100 other expert presentations on quantum technologies with a QSECDEF membership.

About Henning Weier

Henning Weier - Co-Founder - Quantum Space Systems GmbH, made his diploma in physics from TU Munich on QKD. and continued by gaining a PhD degree in physics from LMU Munich (H. Weinfurter’s group, QKD). From 2005 to 2020 he was a Co-founder and served various positions at qutools GmbH. Since 2021 he is a Co-founder and CEO of Quantum Space Systems GmbH (QSSYS)

Organisation

Quantum Space Systems is committed to consulting, research, and development services in the cutting-edge field of quantum key distribution (QKD) and the necessary components. Our team of experts is equipped with the latest knowledge and expertise in the field, enabling us to provide comprehensive solutions that meet our clients’ needs.

Visit Organisation Website

Frequently Asked Questions

Who is Henning Weier?
Henning Weier - Co-Founder - Quantum Space Systems GmbH, made his diploma in physics from TU Munich on QKD. and continued by gaining a PhD degree in physics from LMU Munich (H. Weinfurter’s group, QKD). From 2005 to 2020 he was a Co-founder and served various positions at qutools GmbH. Since 2021.
What is the lecture "Components for Space and Terrestrial QKD"?
This presentation by Henning Weier at the Quantum Security Defence World Symposium covers key concepts, challenges, and developments in quantum cyber security, quantum key distribution, quantum satellite communications.
What is quantum cyber security?
Quantum cyber security applies quantum mechanical principles to protect digital communications and data. It covers quantum key distribution, post-quantum cryptography, and quantum-safe network design.
What is quantum key distribution?
Quantum key distribution uses quantum mechanics to exchange cryptographic keys securely. Any interception disturbs the quantum states and is detectable, providing information-theoretic security.

Access All Expert Lectures

Watch over 100 expert presentations, attend weekly live webinars, and connect with specialists across 40+ countries.