ISARA Insights Blog

Feb 08, 2021

Is Your Cryptographic Infrastructure Healthy?

What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography? With enterprises planning the migration of their entire cryptographic assets from classical…

Philip Lafrance

Learn More


Feb 08, 2021

Is Your Cryptographic Infrastructure Healthy?

What about your organization’s cryptographic infrastructure? Is it healthy? What can enterprises do now to keep theirs in good shape, especially as the industry collectively moves toward post-quantum cryptography? With enterprises planning the migration of their entire cryptographic assets from classical…

Philip Lafrance

Learn More

Jul 27, 2018

Math Paths to Quantum-Safe Security: Isogeny-Based Cryptography

One of the most widely deployed public-key cryptographic algorithms is the elliptic curve Diffie-Hellman key exchange (ECDH). This, as well as most currently used protocols, is vulnerable to attacks using quantum computers. Isogeny-based cryptography offers the closest quantum-safe cryptographic primitives…

Victoria de Quehen

Learn More