ISARA Insights Blog

Featured Blog Post

CEO Atsushi Yamada Discusses Post-Quantum Cryptography and How Organizations Must Act Now

ISARA Corporation
Feb 06, 2024

StrategicCIO360’s Katie Kuehner-Hebert interviewed Atsushi Yamada, CEO of ISARA, about the state of quantum computing and cybersecurity, and how organizations can act now to start preparing their post-quantum cryptography migrations.

Read more


CEO Atsushi Yamada Discusses Post-Quantum Cryptography and How Organizations Must Act Now

ISARA Corporation
Feb 06, 2024

StrategicCIO360’s Katie Kuehner-Hebert interviewed Atsushi Yamada, CEO of ISARA, about the state of quantum computing and cybersecurity, and how organizations can act now to start preparing their post-quantum…

Read more


Make 2024 the Time to Inventory Your Cryptographic Assets

ISARA Corporation
Jan 09, 2024

Quantum computing and the great security risks it poses to current cryptography continue to be top of mind across government agencies, enterprises, and standards organizations. These organizations are…

Read more


Lattice-Based Cryptography

Victoria de Quehen
Sep 21, 2021

Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography…

Read more


Math Paths to Quantum-safe Security: Hash-based Cryptography

Victoria de Quehen
Feb 24, 2020

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…

Read more


Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

Victoria de Quehen
Jul 27, 2018

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…

Read more