Post

Research Paper demonstrates: Proposed quantum computing architecture could factor RSA-2048 in under a week using Shor’s algorithm

Neutral atom arrays have recently emerged as a promising platform for fault-tolerant quantum computing. Based on these advances, including dynamically-reconfigurable connectivity and fast transversal operations, we present a low-overhead architecture that supports the layout and resource estimation of large-scale fault-tolerant quantum algorithms. Utilizing recent advances in fault tolerance with transversal gate operations, this architecture achieves… Read more »

Post

Workshop: Quantum technology and quantum computer-resistant security

October 23, 2025, Darmstadt, Germany Workshop “Quantentechnologie und Quantencomputer-resistente Sicherheit” – partially in German – organised by CAST e.V. (Competence Center for Applied Security Technology) at Fraunhofer SIT in Darmstadt (GER). Asymmetric cryptographic methods are central components of modern IT infrastructures. They serve to achieve essential security goals in a variety of application scenarios – for… Read more »

Post

Webinar: Quantum Foundations to Quantum Futures – a conversation with Peter Shor

October 16, 2025, online Qblox, a US-based manufacturer of qubit control equipment, has organized a Webinar with the inventor of the famous Shor algorithm, Peter Shor (Morss Professor of Applied Mathematics at MIT), for Thursday, October 16, 5:00 PM (CEST), you can register for here: https://qblox.com/webinars/quantum-foundations-to-quantum-futures?utm_source=linkedin&utm_medium=social&utm_campaign=webinar_registration&utm_content=02_10_25 Insights from Shor’s Algorithm creator Few names are as… Read more »

Post

End-to-end compilable implementation of quantum elliptic curve logarithm in Qrisp

Paper published (pre-print) online Elliptic curve cryptography (ECC) is a widely established cryptographic technique, recognized for its effectiveness and reliability across a broad range of applications such as securing telecommunications or safeguarding cryptocurrency wallets. Although being more robust than RSA, ECC is, nevertheless, also threatened by attacks based on Shor’s algorithm, which made it a… Read more »

Post

TNO: Cryptographic Asset Discovery and Inventory

A group of public sector organizations of the Netherlands have commissioned TNO to compile this study on Crypto Asset Discovery and Inventory (CADI) tooling (Dutch only). Organisations must take action now in order to migrate to quantum-safe cryptography in a timely manner. An important first step in this process is to conduct an inventory of… Read more »

Post

Planning for post-quantum cryptography

The Australian Cyber Security Centre has published an updated version of ist recommendations for the migration to PQC Reasons to address the threat of a CRQC now: Organisations should prioritise the protection of their information technology (IT) environment against the threat of a CRQC now, even though a CRQC may not exist for some time…. Read more »

Post

Mappings of Migration to PQC Project Capabilities to NIST Cybersecurity Framework 2.0 and to Security and Privacy Controls for Information Systems and Organizations

This white paper provides a mapping of the project’s capabilities to these two resources. This helps organizations align their PQC migration efforts with established security outcomes (and broader cybersecurity risk management practices) and identify specific security controls and objectives needed to successfully implement PQC migration. Document on PQC migration published by NIST, asking for your… Read more »

Post

Post-Quanten Kryptographie – Informationssicherheit im Zeitalter des Quantencomputer (PQC: Information security in the age of quantum computers)

October 1, 2025, Vorarlberg, Austria Insights & discussion provided at Fachhochschule Vorarlberg (in-person event in German only). The rapid technological advances in quantum technologies offer enormous opportunities, but also require forward-looking investments in information security. Early migration to post-quantum cryptography (PQC) not only secures data and investments against future quantum attacks, but also spreads the… Read more »

Post

Post-quantum cryptography (PQC) pilot by NCSC

Online magazine Quantum Zeitgeist published an article NCSC Launches PQC Pilot to Certify UK Cyber‑Security Consultancies discussing the launch of the pilot. Detailed information on the webpage by the National Cyber Security Centre: Post-quantum cryptography (PQC) pilot – NCSC.GOV.UK The pilot assures consultancies that meet the scheme Standard for post-quantum cryptography. The consultancies will support… Read more »

Post

PQC – Wat moet je ermee?! (PQC – What should you do with it?!)

November 10, 2025, 12:30 – 17:00, Den Haag, The Netherlands This workshop will be held at Digitale Overheid solely for employees of the government of the Netherlands and be presented in Dutch. An engaging afternoon program will bring you up to speed on the latest developments surrounding the migration to PQC (Post Quantum Cryptography). You… Read more »