Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources Abstract +Â In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions, and requires...
How to Secure Quantum Computing in the Cloud Key points… + Quantum computing will likely arrive sooner than expected. 2020 has seen many leaps in the advance of quantum computing,...
Recommendation for Stateful Hash-Based Signature Schemes: NIST SP 800-208 Read More [PDF]… NIST announces the release of Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. This publication supplements FIPS 186 by approving the...
Security Implications Of Quantum Computing Key points… + For public key cryptography, such as RSA and ECC (Elliptic-Curve Cryptography), quantum computing represents an existential event. A fully developed quantum computer...
Swapping Out Your Cryptographic Infrastructure: Complex, Costly, Herculean Effort Informative piece if you have a limited understanding of how data is kept secure. Punctuates the need to get moving on...
Your Organization’s Key to Security May be Your Crypto-Agility Is Critical Infrastructure Ready for Quantum? Points to note… + Organizations with mission-critical security requirements can strengthen and start future-proofing their...