ISARA Insights Blog


Math Paths to Quantum-safe Security: Hash-based Cryptography

Victoria de Quehen
Feb 24, 2020

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…

Read more


Microsoft’s CryptoAPI flaw/CurveBall: a teaser of the quantum threat

Mike Brown
Jan 17, 2020

The National Security Agency recently discovered a major cryptographic flaw in Microsoft’s low-level code within their operating system. This flaw, now known as CurveBall, was found within Windows CryptoAPI…

Read more


Take the First Steps To Quantum-Safe Security Now to Avoid Mistakes Later

Scott Totzke
Nov 12, 2019

The following is an excerpt from a contributed opinion piece on Next Gov by Scott Totzke, CEO & Co-founder of ISARA Corporation. No enterprise—whether a government, a military or a private company—can…

Read more


Quantum-Safe Cryptography: The Time to Prepare Is Now

Scott Totzke
Oct 02, 2019

The following is an excerpt from a contributed opinion piece on DARK Reading by Scott Totzke, CEO & Co-founder of ISARA Corporation. Quantum computing is real and it's evolving fast. Is the security industry…

Read more


Myth-Busting the Quantum Threat: The Top 3 Misconceptions About Quantum-Safe Migrations

Paul Lucier
Jul 23, 2019

Part of our mission at ISARA is to educate and raise awareness of the security risks introduced by large-scale quantum computing. Since I joined ISARA in 2016, I’ve spoken to individuals, enterprises,…

Read more