February 25, 2022 4:03PM
Post-quantumify internal services: Logfwrdr, Tunnel, and gokeyless
Research
Cryptography
Post-Quantum
A big challenge is coming: to change all internal connections at Cloudflare to use post-quantum cryptography. Read how we are tackling this challenge!...
February 24, 2022 4:23PM
Using EasyCrypt and Jasmin for post-quantum verification
Research
Cryptography
Post-Quantum
This blogpost will touch upon how to practically use Jasmin and EasyCrypt to achieve better security guarantees when verifying KEMs...
February 22, 2022 1:59PM
Deep dive into a post-quantum key encapsulation algorithm
Research
Cryptography
Post-Quantum
In this blog post, we will look at what Key Encapsulation Mechanisms are and why they matter in a post-quantum world...
February 22, 2022 1:59PM
Deep dive into a post-quantum signature scheme
Research
Cryptography
Post-Quantum
How can one attest to an identity and prove it belongs to one self? And how can one do it in the face of quantum computers? In this blog post, we examine these questions and explain what post-quantum signatures are...