{"id":1337,"date":"2025-09-23T10:49:18","date_gmt":"2025-09-23T10:49:18","guid":{"rendered":"https:\/\/catedraciber.etsisi.upm.es\/?page_id=1337"},"modified":"2025-09-24T08:44:28","modified_gmt":"2025-09-24T08:44:28","slug":"%f0%9f%a4%94nuestro-cuarto-meetup-todo-un-exito","status":"publish","type":"page","link":"https:\/\/catedraciber.etsisi.upm.es\/en\/%f0%9f%a4%94nuestro-cuarto-meetup-todo-un-exito\/","title":{"rendered":"\ud83e\udd14\u00bfNuestro cuarto Meetup? Todo un \u00e9xito"},"content":{"rendered":"<p>El pasado <strong>18 de septiembre<\/strong> celebramos en la ETSISI nuestro <strong>cuarto Meetup de la C\u00e1tedra de Ciberseguridad<\/strong>, una tarde cargada de ponencias sobre <strong>criptograf\u00eda, computaci\u00f3n cu\u00e1ntica e inteligencia artificial<\/strong>, en la que investigadoras e investigadores de primer nivel compartieron sus experiencias, avances y reflexiones sobre los retos que nos esperan en el futuro cercano.<\/p>\n\n\n\n<p>La jornada reuni\u00f3 a estudiantes, personal investigador y profesionales interesados en descubrir c\u00f3mo la transici\u00f3n al <strong>mundo postcu\u00e1ntico<\/strong> transformar\u00e1 la seguridad de la informaci\u00f3n y abrir\u00e1 nuevas oportunidades tecnol\u00f3gicas.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Cryptography in a Quantum World?<\/strong><br>with <a href=\"https:\/\/scholar.google.com\/citations?hl=en&amp;user=wlOytxsAAAAJ\" data-type=\"link\" data-id=\"https:\/\/www.linkedin.com\/in\/judith-medina-gonzalez-1373b925\/\">Harry Buhrman<\/a><\/p>\n\n\n\n<p>La primera charla corri\u00f3 a cargo de <strong>Harry Buhrman<\/strong>, una de las figuras m\u00e1s influyentes a nivel internacional en computaci\u00f3n cu\u00e1ntica. En su intervenci\u00f3n, ofreci\u00f3 una visi\u00f3n privilegiada sobre los \u00faltimos avances en <strong>tecnolog\u00edas de computaci\u00f3n cu\u00e1ntica<\/strong> y el profundo impacto que estas tendr\u00e1n en la <strong>seguridad de las transacciones cotidianas<\/strong>. Buhrman comparti\u00f3 su experiencia personal observando c\u00f3mo este campo ha pasado de los laboratorios acad\u00e9micos a convertirse en una de las \u00e1reas m\u00e1s din\u00e1micas de la industria tecnol\u00f3gica.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69fb8fc7a7d53&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69fb8fc7a7d53\" class=\"wp-block-image size-large is-style-rounded is-style-rounded--1 wp-lightbox-container\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"983\" height=\"1024\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0196.jpg?resize=983%2C1024&#038;ssl=1\" alt=\"\" class=\"wp-image-1349\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0196-scaled.jpg?resize=983%2C1024&amp;ssl=1 983w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0196-scaled.jpg?resize=288%2C300&amp;ssl=1 288w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0196-scaled.jpg?resize=768%2C800&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0196-scaled.jpg?resize=1475%2C1536&amp;ssl=1 1475w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0196-scaled.jpg?resize=1966%2C2048&amp;ssl=1 1966w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0196-scaled.jpg?resize=12%2C12&amp;ssl=1 12w\" sizes=\"auto, (max-width: 983px) 100vw, 983px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewbox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>La liebre y la tortuga : criptograf\u00eda postcu\u00e1ntica<\/strong><br>with <a href=\"https:\/\/www.catarata.org\/autor\/maria-isabel-gonzalez-vasco\/\">Mar\u00eda Isabel Gonz\u00e1lez Vasco<\/a><\/p>\n\n\n\n<p>La profesora <strong>Mar\u00eda Isabel Gonz\u00e1lez Vasco<\/strong> explor\u00f3 c\u00f3mo la llegada de la <strong>computaci\u00f3n cu\u00e1ntica<\/strong> plantea un doble reto: por un lado, la amenaza a los sistemas criptogr\u00e1ficos actuales; por otro, la oportunidad de desarrollar nuevas soluciones. En su charla destac\u00f3 la b\u00fasqueda de problemas matem\u00e1ticos resistentes a los algoritmos cu\u00e1nticos, desde innovaciones como la <strong>criptograf\u00eda basada en isogenias<\/strong> o en <strong>computaci\u00f3n multipartita<\/strong>, hasta la recuperaci\u00f3n de enfoques cl\u00e1sicos (\u201ccriptograf\u00eda vintage\u201d) basados en <strong>teor\u00eda de c\u00f3digos<\/strong> and <strong>\u00e1lgebra multivariable<\/strong>.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69fb8fc7a82c9&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69fb8fc7a82c9\" class=\"wp-block-image size-large is-style-rounded is-style-rounded--2 wp-lightbox-container\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"680\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0185.jpg?resize=1024%2C680&#038;ssl=1\" alt=\"\" class=\"wp-image-1352\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0185-scaled.jpg?resize=1024%2C680&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0185-scaled.jpg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0185-scaled.jpg?resize=768%2C510&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0185-scaled.jpg?resize=1536%2C1020&amp;ssl=1 1536w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0185-scaled.jpg?resize=2048%2C1360&amp;ssl=1 2048w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0185-scaled.jpg?resize=18%2C12&amp;ssl=1 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewbox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>La tortuga en acci\u00f3n : postcu\u00e1ntica en las empresas<\/strong><br>with <a href=\"https:\/\/www.linkedin.com\/in\/tamara-finogina-87707817a\/?originalSubdomain=es\">Tamara Finogina<\/a><\/p>\n\n\n\n<p>La tercera charla, impartida por <strong>Tamara Finogina<\/strong>, traslad\u00f3 la discusi\u00f3n al terreno pr\u00e1ctico de la <strong>industria tecnol\u00f3gica<\/strong>. Subray\u00f3 la importancia de iniciar ya la transici\u00f3n hacia la <strong>criptograf\u00eda postcu\u00e1ntica<\/strong>, dado el riesgo de los ataques <em>\u201ccosecha ahora, descifra despu\u00e9s\u201d<\/em>. Explic\u00f3 c\u00f3mo este tipo de amenazas ponen en peligro datos que, aunque hoy est\u00e9n seguros, podr\u00edan ser descifrados en un futuro cercano. Finogina present\u00f3 adem\u00e1s c\u00f3mo en <strong>Internxt<\/strong> ya se est\u00e1n dando pasos hacia esta migraci\u00f3n, asegurando la protecci\u00f3n de informaci\u00f3n sensible a largo plazo.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69fb8fc7a87d1&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69fb8fc7a87d1\" class=\"wp-block-image size-large is-style-rounded is-style-rounded--3 wp-lightbox-container\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"680\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0215.jpg?resize=1024%2C680&#038;ssl=1\" alt=\"\" class=\"wp-image-1355\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0215-scaled.jpg?resize=1024%2C680&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0215-scaled.jpg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0215-scaled.jpg?resize=768%2C510&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0215-scaled.jpg?resize=1536%2C1020&amp;ssl=1 1536w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0215-scaled.jpg?resize=2048%2C1360&amp;ssl=1 2048w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0215-scaled.jpg?resize=18%2C12&amp;ssl=1 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewbox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>Una liebre amigable : privacidad en IA con m\u00e9todos cu\u00e1nticos<\/strong><br>with <a href=\"https:\/\/www.linkedin.com\/in\/senaidahernandez\/?locale=es_ES\">Senaida Hern\u00e1ndez Santana<\/a><\/p>\n\n\n\n<p>La jornada concluy\u00f3 con la charla de <strong>Senaida Hern\u00e1ndez Santana<\/strong>, quien puso el foco en la <strong>intersecci\u00f3n entre inteligencia artificial y m\u00e9todos cu\u00e1nticos<\/strong>. Explic\u00f3 c\u00f3mo la IA, aunque aporta beneficios en campos como la <strong>medicina<\/strong> o la <strong>educaci\u00f3n personalizada<\/strong>, tambi\u00e9n abre riesgos en t\u00e9rminos de <strong>privacidad de datos<\/strong>. Para mitigar estos peligros, Hern\u00e1ndez present\u00f3 las <strong>redes de tensores<\/strong>, una herramienta procedente de la f\u00edsica cu\u00e1ntica que permite blindar la inteligencia artificial y garantizar un equilibrio entre innovaci\u00f3n y seguridad.<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69fb8fc7a8ce8&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69fb8fc7a8ce8\" class=\"wp-block-image size-large is-style-rounded is-style-rounded--4 wp-lightbox-container\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"560\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0225.jpg?resize=1024%2C560&#038;ssl=1\" alt=\"\" class=\"wp-image-1357\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0225-scaled.jpg?resize=1024%2C560&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0225-scaled.jpg?resize=300%2C164&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0225-scaled.jpg?resize=768%2C420&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0225-scaled.jpg?resize=1536%2C840&amp;ssl=1 1536w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0225-scaled.jpg?resize=2048%2C1120&amp;ssl=1 2048w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/09\/DSC0225-scaled.jpg?resize=18%2C10&amp;ssl=1 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewbox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>","protected":false},"excerpt":{"rendered":"<p>El pasado 18 de septiembre celebramos en la ETSISI nuestro cuarto Meetup de la C\u00e1tedra de Ciberseguridad, una tarde cargada de ponencias sobre criptograf\u00eda, computaci\u00f3n cu\u00e1ntica e inteligencia artificial, en la que investigadoras e investigadores de primer nivel compartieron sus experiencias, avances y reflexiones sobre los retos que nos esperan en el futuro cercano. La [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1337","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/pages\/1337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/comments?post=1337"}],"version-history":[{"count":8,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/pages\/1337\/revisions"}],"predecessor-version":[{"id":1359,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/pages\/1337\/revisions\/1359"}],"wp:attachment":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/media?parent=1337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}