|
You are here |
quantumcomputinginc.com | ||
| | | | |
numinousxperience.xyz
|
|
| | | | | Quantum computing software, hardware, and quantum sensing stand poised to change the world, but what's investible from a VC perspective now? | |
| | | | |
algassert.com
|
|
| | | | | Craig Gidney's computer science blog | |
| | | | |
educatedguesswork.org
|
|
| | | | | [AI summary] This article discusses the potential threat that quantum computers pose to current cryptographic protocols and outlines strategies for securing communications against such threats. It explains how quantum computing can break existing asymmetric encryption algorithms, like those used in TLS, and highlights the need for post-quantum cryptographic algorithms (PQ). The article details the implementation of these algorithms in existing protocols, the importance of key establishment, and the challenges of transitioning to post-quantum authentication. It concludes by emphasizing the urgency of preparing for a post-quantum future and the role of technologies like automatic certificate issuance in facilitating this transition. | |
| | | | |
blog.cryptographyengineering.com
|
|
| | | Unitards: another consequence ofquantum computing. Back in December I asked readers for some topics they were particularly keen to read about on this blog. One of the best (and sadly, most challenging) suggestions was to say something about post-quantum cryptography. Roughly speaking, this term describes the future of cryptographyafter quantum computers arrive and screw things... | ||