Post-quantum Cryptography VPN
Post-quantum Crypto and VPNs Every time you make a secure connection over the internet – to your bank, to Facebook, or nearly anywhere online – cryptography is what keeps that communication secure. Some of that…
Picnic
“Picnic” is the code name for a post-quantum digital signature algorithm, using a uses what is called a zero-knowledge proof concept.
qTESLA
qTESLA is a collaboration between researchers and engineers at ISARA Corporation, Microsoft Research, Ondokuz Mayis University, Technische Universität Darmstadt, University SãoPaulo and the University of Washington, Tacoma. qTESLA is a family of efficient post-quantum digital…
FrodoKEM
The FrodoKEM post-quantum cryptography project is a collaboration between researchers and engineers at CWI, Google, McMaster University, Microsoft Research, NXP Semiconductors, Stanford University, and the University of Michigan. FrodoKEM is a family of conservative yet…
Supersingular Isogeny Key Encapsulation (SIKE)
SIKE and SIDH are insecure and should not be used. For more information, please refer to the SIKE team’s statement to NIST. Supersingular Isogeny Key Encapsulation (SIKE) is a post-quantum cryptography collaboration between researchers and engineers at Amazon, Florida…
Post-quantum Cryptography
Cryptography in the era of quantum computers The private communication of individuals and organizations is protected online by cryptography. Cryptography protects our information as it travels over and is stored on the internet—whether making a…
Honoring Burton Smith, a creative visionary in computing
Burton J. Smith, an internationally recognized leader in high performance computer architecture, a co-founder of Cray, Inc. and a Microsoft technical fellow who innovated in the field of parallel computing and devoted his life to…