Skip to content
  • Home
  • Categories
    • General
    • Conferences and events
    • Network security
    • Crypto
    • Opinions
    • Device security
    • System administration
Kudelski Security Research

Kudelski Security Research

The Latest News from Research at Kudelski Security

  • Home
  • Categories
    • General
    • Conferences and events
    • Network security
    • Crypto
    • Opinions
    • Device security
    • System administration

Tag: quantum computing

Quantum Attack Resource Estimate: Using Shor’s Algorithm to Break RSA vs DH/DSA VS ECC

August 24, 2021 Tommaso Gagliardoni

Most security experts are by now aware of the threat that the rise of quantum computing poses to modern cryptography. Shor’s quantum algorithm, in particular,

Continue reading

Taking the (quantum) leap with go

May 27, 2021 raynalmathilde

Heard about the quantum threat glooming on the horizon? Today, we dive into post-quantum, or quantum-resistant crypto, which is not to be mixed with quantum

Continue reading

Kudelski Security Expands Research and Advisory Services to Quantum Security

December 9, 2020 Tommaso Gagliardoni

Kudelski Security recently announced the launch of a new focus on quantum security, including expanded research and advisory services that enable security leaders and product

Continue reading

Can You Sign A Quantum State?

May 21, 2019 Tommaso Gagliardoni

Spoiler: no, you can’t, unless you also encrypt the quantum state. In this post we are going to look at recent scientific results about the

Continue reading

Cryptography on a Quantum Computer

April 2, 2019 Tommaso Gagliardoni

Quantum computing research is developing really fast, and we witnessed incredible advancements toward the realization of a practical quantum computer in the last few years.

Continue reading

Our submission to NIST’s post-quantum project: Gravity-SPHINCS

December 1, 2017 JP Aumasson

In posts of September 25 and 28 we described several optimizations to SPHINCS, a signature algorithm that only relies on hash functions’ security, as opposed to RSA

Continue reading

Search

Categories

Archives

Twitter @KudelskiSec

My Tweets
Blog at WordPress.com.
  • Follow Following
    • Kudelski Security Research
    • Join 315 other followers
    • Already have a WordPress.com account? Log in now.
    • Kudelski Security Research
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...