Cybersecurity & Cryptography
Quantum-resistant Cryptography: Lattice Cryptography Now Needed or Needed Now?
Quantum-resistant Cryptography: Lattice Cryptography Now Needed. While the U.S. government is not-funding certain “non-essential” aspects of government at present, the NIST quantum-resistant algorithm ‘challenge’ is on
“To Do” List 2019: Cybersecurity Protection from Quantum Computing
Cybersecurity Protection from Quantum Computing,”To Do” List 2019. The 4th European Cybersecurity Forum, CYBERSEC 2018, is one of the biggest European cybersecurity conferences. Annually providing a
Quantum Computing and Risks to Cyber Security
Quantum Computing and Risks to Cyber Security. Chief Information Security Officer for Bytes Software Services, Steve Marshall, discusses the influence of quantum computing on cyber security.
How Quantum Computing Could Affect Bitcoin and Blockchain
How Quantum Computing Could Affect Bitcoin and Blockchain. Shor’s algorithm enables quantum computers to drastically reduce “the time required to factorize the product of two primes.”
Quantum Key Distribution in the Holland Tunnel
Quantum Key Distribution in the Holland Tunnel. The annual QKD market may demand $2 billion by 2024. The nascent technology promises to be nearly impossible to
Cybersecurity and Quantum Computing Research on Upswing
Cybersecurity and Quantum Computing Research on Upswing. New study suggests trends under cybersecurity’s academic research moniker are on the upswing. Data collected from two 5-years periods,
IoT Security: Solved by Crypto Quantique’s Chip?
IoT Security: Solved by Crypto Quantique’s Chip? IoT device cybersecurity, or lack thereof, is a seemingly insurmountable challenge. Given the millions of devices already in
Quantum Key Distribution and Wind Turbines
Quantum Key Distribution and Wind Turbines, G.E. and U.S. DoE Protecting the Grid. GE protecting the grid, the wind turbines, and quantum computing systems; having been
Secure Data Transmission
Secure Data Transmission. With the rendering of today’s encryption unsafe by quantum computing, quantum-safe cryptographic solutions and services are being taken up as defense to this