Episode 38, August 22, 2018 You know those people who work behind the scenes to make sure nothing bad happens to you, and if they’re really good, you never know who they are because nothing…
Post-quantum Crypto and VPNs Every time you make a secure connection over the internet – to your bank, to Facebook, or nearly anywhere online – cryptography is what keeps that communication secure. Some of that…
“Picnic” is the code name for a post-quantum digital signature algorithm, using a uses what is called a zero-knowledge proof concept.
qTESLA is a collaboration between researchers and engineers at ISARA Corporation, Microsoft Research, Ondokuz Mayis University, Technische Universität Darmstadt, University SãoPaulo and the University of Washington, Tacoma. qTESLA is a family of efficient post-quantum digital…
The FrodoKEM post-quantum cryptography project is a collaboration between researchers and engineers at CWI, Google, McMaster University, Microsoft Research, NXP Semiconductors, Stanford University, and University of Michigan. FrodoKEM is a family of conservative yet practical post-quantum…
SIKE and SIDH are insecure and should not be used. For more information, please refer to the SIKE team’s statement to NIST. Supersingular Isogeny Key Encapsulation (SIKE) is a post-quantum cryptography collaboration between researchers and engineers at Amazon, Florida…
Cryptography in the era of quantum computers The private communication of individuals and organizations is protected online by cryptography. Cryptography protects our information as it travels over and is stored on the internet—whether making a…