
Blog


Post Quantum Scam

Jump the Q

Post Quantum Validation

Post Quantum Resource

Post Quantum Public Education

Post Quantum Regulation

Post Quantum Continuity

Post Quantum Threat Surveillance

Post Quantum R&D

Post Quantum Migration
Post-Quantum Digital Signing for PDF Documents

Mind Your P's and Q's
A comic series by pQCee all about Quantum: Mind your P's and Q's.
Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum

Quantum Computing for Beginners
Discover and learn about Quantum Computing in 5 minutes!
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries
Quantum-Safe Message Authentication for Industrial IOT using “QKDLite” with LPN
Post-Quantum Adversarial Modeling: A User’s Perspective

The Quantum Dilemma

Quantum Annoyance: The Simple Answer Against Store-Now-Decrypt-Later Attacks

Quantum Annoyance
Migrating Blockchains Away from ECDSA for Post-Quantum Security: A Study of Impact on Users and Applications
Due to the potential threat from quantum computers, these blockchain implementations need to migrate away from ECDSA to a post-quantum algorithm before quantum computers become powerful enough.

Are we ready to start Quantum-readiness migration
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices
LPN setup is complicated by different parameter choices, including key length, noise rate, sample size, and verification window, which can determine the usability and security of the implementation.

Software will save the Quantum world (part 2)

Software will save the Quantum world (part 1)

Is Post-Quantum readiness another Y2K
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-Secret

Quantum readiness, here we come

Time to upgrade your encryption

How will going paperless change our trust model

Why digital signatures
Quantum Computing Threat Modelling on a Generic CPS Setup
What is an appropriate threat modelling method to understand your enterprise’s exposure to quantum threats? We recommend Process for Attack Simulation and Threat Analysis (PASTA).

What is Cryptography

How do Quantum computers out-perform modern computers
Layering Quantum-Resistance into Classical Digital Signature Algorithms
Is it possible to make ECDSA signatures quantum-secure? Yes.

What is Post Quantum

What are Quantum Computers
Challenges of Post-Quantum Digital Signing in Real-World Applications: A Survey
In this paper, we study the use of digital signatures in 14 real-world applications across the financial, critical infrastructure, Internet, and enterprise sectors.