Post-quantum Cryptography, Lattice Cryptography, Key Exchange, Long-term Protection
Quantum computers have finally achieved unconditional supremacy
newscientist.com·1d
Trump administration planning expansion of U.S. quantum strategy
cyberscoop.com·23h
'Like talking on the telephone': Quantum computing engineers get atoms chatting long distance
phys.org·1d
Unforgeable quantum money can be stored in an ultracold ‘debit card’
newscientist.com·20h
NIST explains how post-quantum cryptography push overlaps with existing security guidance
cybersecuritydive.com·1d
The Hidden Risk in Notion 3.0 AI Agents: Web Search Tool Abuse for Data Exfiltration
simonwillison.net·20h
Everything you know is wrong
lawrencecpaulson.github.io·15h
The God Mode Vulnerability That Should Kill “Trust Microsoft” Forever
infosecwriteups.com·22h
Intuitions Behind the Range Proofs of Bulletproof
cryptologie.net·1d
Loading...Loading more...