ISARA Insights Blog

Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

Victoria de Quehen
Jul 27, 2018

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…

Read more

Why are Washington lawmakers suddenly so interested in quantum tech?

Paul Lucier
Jun 28, 2018

Blockchain. Artificial intelligence. Machine learning. These have all become buzzwords in Washington as lawmakers hear about how these promising technologies are expected to benefit the American public…

Read more

A Short History of Public Key Cryptography

Victoria de Quehen
Jun 14, 2018

While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one…

Read more

What's the Rush on Quantum-Safe Security? You Already May Be Too Late

Scott Totzke
May 02, 2018

The following is an excerpt from a contributed opinion piece on Journal of Cyber Policy by Scott Totzke, CEO & Co-founder of ISARA Corporation. The dawn of the quantum computing era promises to fundamentally…

Read more

The Peggy Smedley Show: Quantum Threats and Benefits

ISARA Corporation
Apr 26, 2018

On April 24, ISARA Corporation's VP of Business Development, Paul Lucier, was invited to join The Peggy Smedley Show - one of the most influential, Internet of Things (IoT) podcasts discussing relevant…

Read more