RESEARCH & PUBLICATIONS

WHITE PAPERS

Enabling Quantum-Safe Migration with Crypto-Agile Certificates

Enabling Quantum-Safe Migration with Crypto-Agile Certificates

Over the past few decades, many organizations and governments have made substantial investments to deploy public key infrastructure (PKI) systems ...
Read more
The Quantum Revolution: Security Implications and Considerations

The Quantum Revolution: Security Implications and Considerations

Powerful quantum computers have the potential to bring positive disruption and tremendous benefits to our society. However, they also pose ...
Read more

RESEARCH PAPERS

The Viability of Post-quantum X.509 Certificates

The Viability of Post-quantum X.509 Certificates

If quantum computers were built, they would pose concerns for public key cryptography as we know it. Among other cryptographic ...
Read more
Hash-based signatures Quantum-Oracle Model

Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model

Digital signatures constructed solely from hash functions offer competitive signature sizes and fast signing and verifying times. Moreover, the security ...
Read more
Revisiting TESLA in the quantum random oracle model

Revisiting TESLA in the quantum random oracle model

We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a tight ...
Read more

ISARA’S NIST POST-QUANTUM SUBMISSIONS

qTESLA

qTESLA

About qTESLA qTESLA is a lattice-based digital signature scheme designed to be secure even against attackers armed with a quantum ...
Read more
QC-MDPC KEM

QC-MDPC KEM

QC-MDPC KEM is a code-based Key Encapsulation Mechanism based on the McEliece encryption scheme. The system uses quasi-cyclic moderate density ...
Read more

PRESENTATIONS

ISARA Quantum-Safe PKI Transitions

Quantum-Safe PKI Transitions

Enterprise PKI supporting remote VPN can be quite large and ...
Read more
ISARA Presentations Corporate Network

Quantum Safety and Your Corporate Network

The rise of Artificial Intelligence (AI) is helping to fuel ...
Read more
ISARA Presentations

Quantum Threats: The Next Undefended Frontier of Cybersecurity

Cybersecurity threats are evolving more quickly than most organizations can ...
Read more

Archive