Cybersecurity & Cryptography
Quantum-Resistant Signatures on Your Host
Quantum-Resistant Signatures on Your Host. The vulnerabilities of prime number factorization posed by quantum computers is alarming as much of our PKI-based infrastructure relies
Risk and Mitigations for Quantum Computing Enterprise Systems
Risk and Mitigations for Quantum Computing Enterprise Systems. What is the scope of the quantum computing risk to your cryptographic infrastructure? This report looks
QKD Over Long Distance; Crucial to Data Security
QKD Over Long Distance; Crucial to Data Security. Quantum Key Distribution, QKD, utilizes photon entanglement to distribute encryption keys with near-total security. Research conducted
Voting by Mobile Phone is Bad. Using Blockchain, Worse.
Voting by Mobile Phone is Bad. Using Blockchain, Worse. West Virginia is set to test blockchain for voting. The ballot will be right in
Quantum-resistant Password-Authenticated Key Exchange Partners
Quantum-resistant Password-Authenticated Key Exchange Partners. Enhancing banking security with quantum-resistant password-authenticated key exchange (PAKE) is a goal for BANKEX and several academic and financial
Bitcoin Getting Quantum Resistant
Bitcoin Getting Quantum Resistant. NEO Mainnet will team with ArQit to bring QKD and other quantum technology to the blockchain. “To this blockchain we
CiViQ: Securing Quantum Communications Without the Photons.
The Quantum Flagship initiative launched by the European Union will fund alternative cybersecurity and cryptography development through a project dubbed Continuous Variable Quantum Communications (CiViQ).
CiViQ: Securing Quantum Communications Without the Photons
CiViQ: Securing Quantum Communications Without the Photons. The Quantum Flagship initiative launched by the European Union will fund alternative cybersecurity and cryptography development through a
Post-Quantum Cryptography, Primer Blog
Post-Quantum Cryptography, Primer Blog. PQC, or post-quantum cryptography, is becoming a more familiar term amongst cryptographic and cybersecurity communities. With the media-blitz of the