| 
	     You are here  | 
        www.imperialviolet.org | ||
| | | | | 
            
              dadrian.io
             | 
        |
| | | | | Large-scale quantum computers are capable of breaking all of the common forms of asymmetric cryptography used on the Internet today. Luckily, they don't exist yet. The Internet-wide transition to post-quantum cryptography began in 2022 when NIST announced their final candidates for key exchange and signatures in the NIST PQC competition. There is plenty written about the various algorithms and standardization processes that are underway. The conventional wisdom is that it will take a long time to transit... | |
| | | | | 
            
              jeremykun.wordpress.com
             | 
        |
| | | | | This article was written by my colleague, Cathie Yun. Cathie is an applied cryptographer and security engineer, currently working with me to make fully homomorphic encryption a reality at Google. She's also done a lot of cool stuff with zero knowledge proofs. In previous articles, we've discussed techniques used in Fully Homomorphic Encryption (FHE) schemes.... | |
| | | | | 
            
              neilmadden.blog
             | 
        |
| | | | | Wikipedia's definition of a digital signature is: A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a message gives a recipient confidence that the message came from a sender known to the recipient. -Wikipedia They also have a handy diagram of the process... | |
| | | | | 
            
              excited-pixels.com
             | 
        |
| | | Matt Burgess at Wired has a good summary article on the current (and always ongoing) debate concerning the availability of strong encryption. In short, he sees three 'classes' of argument which are aimed at preventing individuals from protecting their communications (and their personal information) with robust encryption. Governments or law enforcement agencies are asking for... | ||