Under Starters Orders: The Race is on to Address One of the Greatest Challenges in Modern Computer Science

In January 2019, NIST took 69 submissions for Post-Quantum Cryptography (PQC) standardization and created a shorter-list of 29. This process aims to address the major problem of quantum computers cracking discrete logarithms, elliptic curve cryptography (eg ECDH for key exchange and ECDSA for digital…

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Infosec Course Materials .Learn and Share

DDNS updater code for CloudFlare DNS

Stake, Farm and Earn LP tokens on XcelSwap

Cover Protocol Claim Briefing 3: BT.Finance

{UPDATE} Tabu - Forbidden Words Game Hack Free Resources Generator

Windows 11 Upgrade For Free!!!

Windows 11 Upgrade For Free!!!

Vulnerability Disclosure — April 14, 2021

Log4J Intruder vs. Pooh Bear

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

One of the Greatest Cybersecurity Challenge in the Next Decade … Post Quantum Cryptography

Bufferbloat, The Blind Men and the Elephant