Cryptography for the post-quantum world with Dr. Brian LaMacchia
Episode 38, August 22, 2018 You know those people who work behind the scenes to make sure nothing bad happens to you, and if they’re really good, you never know who they are because nothing…
Post-quantum Cryptography VPN
Post-quantum Crypto and VPNs Every time you make a secure connection over the internet – to your bank, to Facebook, or nearly anywhere online – cryptography is what keeps that communication secure. Some of that…
Picnic
“Picnic” is the code name for a post-quantum digital signature algorithm, using a uses what is called a zero-knowledge proof concept.
qTESLA
qTESLA is a collaboration between researchers and engineers at ISARA Corporation, Microsoft Research, Ondokuz Mayis University, Technische Universität Darmstadt, University SãoPaulo and the University of Washington, Tacoma. qTESLA is a family of efficient post-quantum digital…
FrodoKEM
The FrodoKEM post-quantum cryptography project is a collaboration between researchers and engineers at CWI, Google, McMaster University, Microsoft Research, NXP Semiconductors, Stanford University, and the University of Michigan. FrodoKEM is a family of conservative yet…
Supersingular Isogeny Key Encapsulation (SIKE)
SIKE and SIDH are insecure and should not be used. For more information, please refer to the SIKE team’s statement to NIST. Supersingular Isogeny Key Encapsulation (SIKE) is a post-quantum cryptography collaboration between researchers and engineers at Amazon, Florida…
Post-quantum Cryptography
Cryptography in the era of quantum computers The private communication of individuals and organizations is protected online by cryptography. Cryptography protects our information as it travels over and is stored on the internet—whether making a…