Deep dive into a post-quantum key encapsulation algorithm
February 22, 2022 1:59 PM
In this blog post, we will look at what Key Encapsulation Mechanisms are and why they matter in a post-quantum world...
February 22, 2022 1:59 PM
In this blog post, we will look at what Key Encapsulation Mechanisms are and why they matter in a post-quantum world...
February 22, 2022 1:59 PM
How can one attest to an identity and prove it belongs to one self? And how can one do it in the face of quantum computers? In this blog post, we examine these questions and explain what post-quantum signatures are...
February 21, 2022 1:59 PM
At Cloudflare, we strive to help build a better Internet, which means a quantum-protected one. In this post, we look at the challenges for migrating to post-quantum cryptography and what lies ahead using a taxonomy...
February 21, 2022 1:59 PM
What is quantum computing and what advances have been made so far on this front? In this blog post, we will answer this question and see how to protect against quantum adversaries...
November 08, 2021 3:39 PM
How much room does TLS have for the big post-quantum signatures? We had a look: it’s tight....
December 11, 2020 12:00 PM
As quantum computing continues to mature, research and development efforts in cryptography are keeping pace. We’re working with academia and industry peers to help create a new set of cryptography standards that are resilient to attack from quantum computers....
October 30, 2019 1:00 PM
In June, we announced a wide-scale post-quantum experiment with Google. We implemented two post-quantum (i.e., not yet known to be broken by quantum computers) key exchanges, integrated them into our TLS stack and deployed the implementation on our edge servers and in Chrome Cana...
June 20, 2019 1:02 PM
The impact of quantum computing on cryptography conducts research and development towards a Post-Quantum era....
September 01, 2017 8:48 PM
Most of today's cryptography is designed to be secure against an adversary with enormous amounts of computational power. This means estimating how much work certain computations require, and choosing cryptographic parameters based on our best estimates....