RESEARCH & PUBLICATIONS

WHITE PAPERS

Enabling Quantum-Safe Migration with Crypto-Agile Certificates

Enabling Quantum-Safe Migration with Crypto-Agile Certificates

Over the past few decades, many organizations and governments have made substantial investments to deploy public key infrastructure (PKI) systems ...
Read more
The Quantum Revolution: Security Implications and Considerations

The Quantum Revolution: Security Implications and Considerations

Powerful quantum computers have the potential to bring positive disruption and tremendous benefits to our society. However, they also pose ...
Read more

RESEARCH PAPERS

Homomorphism learning problems and its applications to public-key cryptography

Homomorphism learning problems and its applications to public-key cryptography

CFAIL is a conference for papers that describe ``instructive failures or not-yet-successes'' in cryptography. This paper presents our partially successful ...
Read more
QC-MDPC: A Timing Attack and a CCA2 KEM

QC-MDPC: A Timing Attack and a CCA2 KEM

In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) ...
Read more
The Viability of Post-quantum X.509 Certificates

The Viability of Post-quantum X.509 Certificates

If quantum computers were built, they would pose concerns for public key cryptography as we know it. Among other cryptographic ...
Read more
Hash-based signatures Quantum-Oracle Model

Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model

Digital signatures constructed solely from hash functions offer competitive signature sizes and fast signing and verifying times. Moreover, the security ...
Read more
Loading...

ISARA’S NIST POST-QUANTUM SUBMISSIONS

qTESLA

qTESLA

About qTESLA qTESLA is a lattice-based digital signature scheme designed to be secure even against attackers armed with a quantum ...
Read more

PRESENTATIONS

ISARA Quantum-Safe PKI Transitions

Quantum-Safe PKI Transitions

Enterprise PKI supporting remote VPN can be quite large and ...
Read more
ISARA Presentations Corporate Network

Quantum Safety and Your Corporate Network

The rise of Artificial Intelligence (AI) is helping to fuel ...
Read more
ISARA Presentations

Quantum Threats: The Next Undefended Frontier of Cybersecurity

Cybersecurity threats are evolving more quickly than most organizations can ...
Read more

GUIDES & OVERVIEWS

Hudson Institute Executive's Guide to Quantum Computing and Quantum-safe Cybersecurity

Hudson Institute Executive’s Guide to Quantum Computing and Quantum-secure Cybersecurity

Quantum computing and the threat it poses to current public key cryptography is gaining awareness amongst security professionals. However, there's ...
Read more

TUTORIALS

Isogeny-Based Cryptography Tutorial

Isogeny-Based Cryptography Tutorial

By ISARA Corporation August 1, 2019 Isogeny-based cryptography is one of the most promising areas of quantum-safe cryptography, but it ...
Read More