ISARA Insights Blog

Featured Blog Post

Lattice-Based Cryptography

Victoria de Quehen
Sep 21, 2021

Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography to highly complex protocols.

Read more


Lattice-Based Cryptography

Victoria de Quehen
Sep 21, 2021

Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography…

Read more


US Government’s Deep Dive into China and Why the Quantum Threat Matters

Paul Lucier
Oct 07, 2020

China continues to make significant advances in quantum science and with quantum communication networks. Do these developments pose a threat we should be worried about? The US Congress thinks so. On…

Read more


Math Paths to Quantum-safe Security: Hash-based Cryptography

Victoria de Quehen
Feb 24, 2020

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…

Read more


Myth-Busting the Quantum Threat: The Top 3 Misconceptions About Quantum-Safe Migrations

Paul Lucier
Jul 23, 2019

Part of our mission at ISARA is to educate and raise awareness of the security risks introduced by large-scale quantum computing. Since I joined ISARA in 2016, I’ve spoken to individuals, enterprises,…

Read more


Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

Victoria de Quehen
Jul 27, 2018

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…

Read more