ISARA Insights Blog

Featured Blog Post

COVID-19: A message from our Co-founders

ISARA Corporation
Mar 26, 2020

During this difficult time, we first hope that you and your loved ones are safe and healthy. As the world continues to experience rapid changes, we would like to share with you how we've adapted to the ongoing pandemic and how we're meeting the challenges at hand to do our part in reducing the spread of COVID-19.

Read more


Math Paths to Quantum-safe Security: Hash-based Cryptography

Victoria de Quehen
Feb 24, 2020

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…

Read more


Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

Victoria de Quehen
Jul 27, 2018

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…

Read more


A Short History of Public Key Cryptography

Victoria de Quehen
Jun 14, 2018

While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one…

Read more