February 24, 2022 5:30PM
Building Confidence in Cryptographic Protocols
Research
Cryptography
Post-Quantum
This blogpost refers to the efforts to use formal/verification/implementation for post-quantum algorithms to achieve better assurance for them. It also touches on our Cloudflare efforts on this...
February 24, 2022 4:23PM
Using EasyCrypt and Jasmin for post-quantum verification
Research
Cryptography
Post-Quantum
This blogpost will touch upon how to practically use Jasmin and EasyCrypt to achieve better security guarantees when verifying KEMs...
February 23, 2022 1:59PM
Making protocols post-quantum
Research
Cryptography
Post-Quantum
Post-quantum key exchange and signature algorithms come with different trade-offs that we’re not used to. How do we handle that when updating protocols, and is this an opportunity to revisit the status quo?...
February 22, 2022 1:59PM
Deep dive into a post-quantum key encapsulation algorithm
Research
Cryptography
Post-Quantum
In this blog post, we will look at what Key Encapsulation Mechanisms are and why they matter in a post-quantum world...
February 22, 2022 1:59PM
Deep dive into a post-quantum signature scheme
Research
Cryptography
Post-Quantum
How can one attest to an identity and prove it belongs to one self? And how can one do it in the face of quantum computers? In this blog post, we examine these questions and explain what post-quantum signatures are...
February 21, 2022 1:59PM
The post-quantum state: a taxonomy of challenges
At Cloudflare, we strive to help build a better Internet, which means a quantum-protected one. In this post, we look at the challenges for migrating to post-quantum cryptography and what lies ahead using a taxonomy...