Featured Blog Post
Victoria de Quehen
Sep 21, 2021
Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography to highly complex protocols.
Victoria de Quehen
Sep 21, 2021
Lattice-based cryptography is the most important area of quantum-safe cryptography and is known for its efficiency and versatility. Its use cases range from the foundational building blocks of cryptography…
Philip Lafrance
Feb 08, 2021
What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography?…
Paul Lucier
Jul 30, 2020
On July 22nd National Institute of Standards and Technology (NIST) announced that they have entered the ‘selection’ round in the process of standardizing post-quantum cryptography. If you’re reading this,…
Victoria de Quehen
Feb 24, 2020
Digital signature algorithms are a critical component of public-key infrastructure, with applications ranging from code signing to establishing secure connections. However, classical digital signature…
Victoria de Quehen
Jul 27, 2018
One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using…