Post

ETSI creates New Committee on Quantum Technologies

Announced online on the press realease pages by ETSI The ETSI Board has recently approved the creation of a new Technical Committee on Quantum Technologies (TC QT) marking a significant milestone in ETSI’s commitment to advancing the underlying framework of standards for quantum technologies across numerous quantum-related domains. Key Areas of Activity: ETSI is one… Read more »

Post

FS-ISAC Urges Global Coordination for Migration to Post-Quantum Cryptography in Financial Services

In response to the global challenge of the transition to quantum-resilient cryptography, FS-ISAC, the member-driven, not-for-profit organization that advances cybersecurity and resilience in the global financial system, today published The Timeline for Post Quantum Cryptographic Migration, detailing the importance of establishing a global transition timeline for the financial sector’s migration. Full text and more information… Read more »

Post

Post-quantum security for SSH access on GitHub

GitHub is introducing post-quantum secure key exchange methods for SSH access to better protect Git data in transit. Announcement published in the github blog From the webpage:“Today, we’re announcing some changes that will improve the security of accessing Git data over SSH. What’s changing? We’re adding a new post-quantum secure SSH key exchange algorithm, known… Read more »

Post

Research Paper demonstrates: Proposed quantum computing architecture could factor RSA-2048 in under a week using Shor’s algorithm

Neutral atom arrays have recently emerged as a promising platform for fault-tolerant quantum computing. Based on these advances, including dynamically-reconfigurable connectivity and fast transversal operations, we present a low-overhead architecture that supports the layout and resource estimation of large-scale fault-tolerant quantum algorithms. Utilizing recent advances in fault tolerance with transversal gate operations, this architecture achieves… Read more »

Post

Workshop: Quantum technology and quantum computer-resistant security

October 23, 2025, Darmstadt, Germany Workshop “Quantentechnologie und Quantencomputer-resistente Sicherheit” – partially in German – organised by CAST e.V. (Competence Center for Applied Security Technology) at Fraunhofer SIT in Darmstadt (GER). Asymmetric cryptographic methods are central components of modern IT infrastructures. They serve to achieve essential security goals in a variety of application scenarios – for… Read more »

Post

Webinar: Quantum Foundations to Quantum Futures – a conversation with Peter Shor

October 16, 2025, online Qblox, a US-based manufacturer of qubit control equipment, has organized a Webinar with the inventor of the famous Shor algorithm, Peter Shor (Morss Professor of Applied Mathematics at MIT), for Thursday, October 16, 5:00 PM (CEST), you can register for here: https://qblox.com/webinars/quantum-foundations-to-quantum-futures?utm_source=linkedin&utm_medium=social&utm_campaign=webinar_registration&utm_content=02_10_25 Insights from Shor’s Algorithm creator Few names are as… Read more »

Post

End-to-end compilable implementation of quantum elliptic curve logarithm in Qrisp

Paper published (pre-print) online Elliptic curve cryptography (ECC) is a widely established cryptographic technique, recognized for its effectiveness and reliability across a broad range of applications such as securing telecommunications or safeguarding cryptocurrency wallets. Although being more robust than RSA, ECC is, nevertheless, also threatened by attacks based on Shor’s algorithm, which made it a… Read more »

Post

TNO: Cryptographic Asset Discovery and Inventory

A group of public sector organizations of the Netherlands have commissioned TNO to compile this study on Crypto Asset Discovery and Inventory (CADI) tooling (Dutch only). Organisations must take action now in order to migrate to quantum-safe cryptography in a timely manner. An important first step in this process is to conduct an inventory of… Read more »

Post

Planning for post-quantum cryptography

The Australian Cyber Security Centre has published an updated version of ist recommendations for the migration to PQC Reasons to address the threat of a CRQC now: Organisations should prioritise the protection of their information technology (IT) environment against the threat of a CRQC now, even though a CRQC may not exist for some time…. Read more »

Post

Mappings of Migration to PQC Project Capabilities to NIST Cybersecurity Framework 2.0 and to Security and Privacy Controls for Information Systems and Organizations

This white paper provides a mapping of the project’s capabilities to these two resources. This helps organizations align their PQC migration efforts with established security outcomes (and broader cybersecurity risk management practices) and identify specific security controls and objectives needed to successfully implement PQC migration. Document on PQC migration published by NIST, asking for your… Read more »

This website stores cookies on your computer. These cookies are used to provide a more personalized experience and to track your whereabouts around our website in compliance with the European General Data Protection Regulation. If you decide to to opt-out of any future tracking, a cookie will be setup in your browser to remember this choice for one year.

Accept or Deny