Featured Blog Post
Philip Lafrance
Feb 23, 2023
The ETSI/IQC Quantum Safe Workshop returned last week after a one year hiatus, held in-person at ETSI’s headquarters in the beautiful South of France. Regarded by many as the world’s premier event in quantum-safe security, the Workshop yet again brought together a diverse blend of talent, experience, and perspectives on the growing quantum threat to information security.
Philip Lafrance
Feb 23, 2023
The ETSI/IQC Quantum Safe Workshop returned last week after a one year hiatus, held in-person at ETSI’s headquarters in the beautiful South of France. Regarded by many as the world’s premier event in quantum-safe…
Victoria de Quehen
Sep 21, 2021
Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography…
Victoria de Quehen
Feb 24, 2020
Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…
Victoria de Quehen
Jul 27, 2018
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…
Victoria de Quehen
Jun 14, 2018
While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one…