ISARA Insights Blog

Featured Blog Post

A Recap of the 9th ETSI/IQC Quantum Safe Workshop

Philip Lafrance
Feb 23, 2023

The ETSI/IQC Quantum Safe Workshop returned last week after a one year hiatus, held in-person at ETSI’s headquarters in the beautiful South of France. Regarded by many as the world’s premier event in quantum-safe security, the Workshop yet again brought together a diverse blend of talent, experience, and perspectives on the growing quantum threat to information security.

Read more


A Recap of the 9th ETSI/IQC Quantum Safe Workshop

Philip Lafrance
Feb 23, 2023

The ETSI/IQC Quantum Safe Workshop returned last week after a one year hiatus, held in-person at ETSI’s headquarters in the beautiful South of France. Regarded by many as the world’s premier event in quantum-safe…

Read more


Lattice-Based Cryptography

Victoria de Quehen
Sep 21, 2021

Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography…

Read more


Math Paths to Quantum-safe Security: Hash-based Cryptography

Victoria de Quehen
Feb 24, 2020

Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…

Read more


Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

Victoria de Quehen
Jul 27, 2018

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…

Read more


A Short History of Public Key Cryptography

Victoria de Quehen
Jun 14, 2018

While the ideal of public-key cryptography is to have a “set and forget” group of algorithms that will guarantee security forever, increasingly we are realizing this ideal is not viable. There is not one…

Read more