ISARA Insights Blog

Dec 08, 2025

Cybersecurity in the Age of Quantum Computing: A Cryptographer’s Call to Action

Computing power has advanced far beyond the invention of the transistor. Today’s digital infrastructures rely on public-key cryptography to safeguard commerce, state secrets and personal privacy. But a new paradigm is within our view. Quantum computers utilize superposition and entanglement to perform…

ISARA Corporation & Accenture Federal Services

Learn More


Sep 21, 2021

Lattice-Based Cryptography

Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography to highly complex protocols.

Victoria de Quehen

Learn More

Feb 24, 2020

Math Paths to Quantum-safe Security: Hash-based Cryptography

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature algorithms will be vulnerable to quantum-enabled attacks. Hash-based cryptography is among the oldest…

Victoria de Quehen

Learn More

Jul 27, 2018

Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny-based cryptography offers the closest quantum-safe cryptographic primitives…

Victoria de Quehen

Learn More

Jun 14, 2018

A Short History of Public Key Cryptography

While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one cryptographic algorithm with a fixed set of parameters that will last indefinitely. As computers…

Victoria de Quehen

Learn More