https://xiphera.com/trainings/
Dec 5, 2024 - With Xiphera’s Excellence in Cryptography trainings, both you and your team will be provided with the best state-of-the-art cryptographic knowledge.
trainingsexcellencecryptography
https://xiphera.com/webinars/
Dec 5, 2024 - Xiphera’s webinar series Cryptography Under the Hood covers topical and interesting themes around cryptography and security.
webinarscryptographyhood
https://adguard-dns.io/en/blog/adguard-dns-v2-19.html
Dec 22, 2025 - Once again, AdGuard DNS steps ahead of the curve, becoming the first DNS service to bring client-side post-quantum cryptography.
post quantum cryptographyadguard dnssupports
https://xiphera.com/cavp-validated-post-quantum-security/
Dec 17, 2025 - CAVP-validated Post-Quantum Cryptography for critical systems. Xiphera delivers hardware-based security. Read more about CAVP validated ML-KEM and ML-DSA.
post quantum cryptographyvalidated
https://www.manning.com/liveproject/public-key-cryptography-rust
Secure emails using Rust and RSA encryption, mastering prime number identification, factoring, and building a complete RSA implementation.
public keycryptographyrodstephens
https://words.filippo.io/go1-20/
My plans for Go 1.20 include landing the crypto/ecdh package, making progress on moving math/big out of the security perimeter, and a batch of crypto/tls work.
planninggocryptographywork
https://physicsworld.com/a/quantum-cryptography-in-practice/
Nov 19, 2025 - A research team from China have proposed a new, experimentally feasible, method to encrypt messages using the principles of quantum mechanics
quantum cryptographyphysics worldpractice
https://link.springer.com/book/10.1007/978-3-030-64381-2?error=cookies_not_supported&code=32ebe97b-1e35-4099-93b1-6141a562a2dd
This conference book shares novel ideas and experiences in the areas of Green, Pervasive, and Cloud Computing.
international conferencetheorycryptographytccdurham
https://crypto.stackexchange.com/questions/119384/security-in-the-standalone-and-simplfied-uc-model
I am learning about simulation based proofs, specifically the tutorial by Lindell and the simplified UC paper by Canetti et al, and I am trying to understand...
multipartycomputationsecuritystandaloneuc
https://www.mackenziemorehead.com/putting-the-cryptography-back-in-crypto/
We’re entering an era in which you can probe a black box and an answer comes out that’s cryptographically guaranteed to be correct without revealing why...
puttingcryptographyback
https://www.netmeister.org/blog/netbsd-pqc.html
Quick instructions to set up Post-Quantum Cryptography (PQC) on NetBSD using Open Quantum Safe and BoringSSL.
post quantum cryptographynetbsd
https://link.springer.com/chapter/10.1007/978-3-030-88428-4_12?error=cookies_not_supported&code=98941fde-a8bb-478d-92a0-bfbcffe4b662
Quantum cryptography allows one to transmit secret information securely, based on the laws of quantum physics. It consists of (1) the transmission of physical...
quantum cryptographycachesidechannelmitigation
https://www.networkworld.com/article/3574556/gartner-top-10-strategic-technology-trends-for-2025.html
May 28, 2025 - Agentic AI, post-quantum cryptography, AI governance, and hybrid computing are among the most pressing and potentially disruptive trends that enterprises are...
strategic technologygartnertoptrendscryptography
https://link.springer.com/book/10.1007/978-3-031-33488-7?error=cookies_not_supported&code=864f9af7-16ef-4444-862f-3c65f3e91b31
These proceedings focus on current research that advance the areas of applied cryptography, cyber security (incl. network & computer security) and privacy.
applied cryptographynetwork securityinternational conference
https://phd-defense.viguier.nl/
In this thesis we cover a large part of the classical cryptography world: we examine the design of new symmetric primitive; we explore implementation...
phddefensepanoramaclassicalcryptography
https://crypto.stackexchange.com/questions/119280/do-i-have-the-right-understanding-of-universal-hash-crypto-hash-and-random-ora
Universal Hash: It involves uniform random sampling from a keyed function family. Therefore, it possesses collision resistance but does not require preimage...
rightunderstandinguniversalhashcrypto
https://www.ubuntupit.com/ubuntu-security-roundup-fixes-for-fetchmail-go-cryptography-linux-kernel-and-more/
Oct 25, 2025 - Ubuntu fixes major vulnerabilities in fetchmail, Go Cryptography, and Linux kernels for Oracle and AWS systems.
linux kernelubuntusecurityroundupfixes
https://www.rambus.com/security/quantum-safe-cryptography/
Mar 10, 2025 - Our Quantum Safe IP solutions secures data and hardware against quantum computer attacks using NIST and CNSA selected algorithms.
quantum safecryptographysolutionssecurityip
https://www.wwt.com/article/partner-pov-post-quantum-cryptography-the-real-risks-of-not-adopting-it
Sep 24, 2025 - The uneven migration to post-quantum cryptography (PQC) poses future compliance and cybersecurity risks.
post quantum cryptographypartnerpovrealrisks
https://link.springer.com/book/10.1007/978-3-030-75245-3?error=cookies_not_supported&code=cd964a83-523c-4541-a8b1-3932ba185f5c
The PKC 2021 proceedings focus on all aspects of public-key cryptography, covering theory, implementations and applications.
public keyinternational conferencecryptography
https://link.springer.com/book/10.1007/978-3-642-28914-9?error=cookies_not_supported&code=02f77811-cffe-404a-939e-b0aa8ee72410
theorycryptographyconferencetcc
https://www.techtarget.com/searchsecurity/video/An-explanation-of-quantum-cryptography
Learn how quantum cryptography uses physics and photons to create unhackable encryption that withstands quantum computing threats.
quantum cryptographyexplanationtechtarget
https://mizbancloud.com/blog/Cryptography
کاربردهای Cryptography | دسته بندی های مختلف در Cryptography | چه نیازی به امضای دیجیتال ( Cryptography )...
cryptography
https://www.sealsq.com/about/research-innovation/post-quantum-cryptography
Sep 8, 2025 - Quantum computers: a serious threat for digital security. Discover how SEALSQ develops post-quantum cryptography solutions to protect devices and systems
post quantum cryptography
https://www.mitre.org/news-insights/employee-voice/eye-solutions-cryptography-feeds-engineers-passion-puzzles-using-ai
The cybersecurity engineer and recent graduate of MITRE’s Cyber New Professional’s Program is winning kudos for her notable research in the cryptography...
eyesolutionscryptographyfeedspassion
https://xiphera.com/
Nov 20, 2025 - Xiphera protects your critical systems with fully in-house designed cryptographic IP cores implemented in pure hardware logic design.
purelogiccryptographysecurity
https://www.linuxfoundation.org/press/announcing-the-post-quantum-cryptography-alliance-pqca
Alliance seeks to address the security challenges posed by quantum computing through the development and adoption of post-quantum cryptography
post quantum cryptographyalliancelaunchesadvance
https://ethresear.ch/t/the-ec-fft-algorithm-without-elliptic-curve-and-isogenies/11346
The ECFFT algorithm (without elliptic curve and isogenies!) thanks to William Borgeaud for helping me understanding the original ECFFT algorithm tl’dr: this...
ecfftalgorithmwithoutelliptic
https://paragraph.com/@privacy-scaling-explorations/beyond-zero-knowledge-what-s-next-in-programmable-cryptography
Nov 9, 2023 - This post was written by kichong with helpful feedback and comments from sinu and jmall. MPC, FHE, iO. If these combinations of letters make little sense to...
beyond zeroknowledgenextprogrammablecryptography
https://www.thecybersecurityreview.com/cxoinsight/cryptography-innovations-for-the-enterprise-nwid-535.html
Cryptography is believed by many to be a mature field of study. Still there are many exciting innovations under development.
cryptographyinnovationsenterprise
https://www.freecodecamp.org/news/cryptography-for-beginners-full-python-course-sha-256-aes-rsa-passwords/
We just posted a course on the freeCodeCamp.org YouTube channel that will teach you all about cryptography. You'll learn essential techniques like hashing...
cryptographybeginnersfullpythoncourse
https://opensource.net/security-cryptography-algorithms-python/
Mar 3, 2025 - These algorithms have been extensively studied by cryptographers, and open-source implementations have benefited from the scrutiny of countless security...
securitycryptographyalgorithmsguideopensource
https://www.f5.com/solutions/post-quantum-cryptography-readiness
See how to protect sensitive data from potential threats of quantum computing with NIST-standardized post-quantum cryptography for modern & legacy...
post quantum cryptographypqcreadinesssolutions
https://timviecit.net/cryptography-la-gi-va-no-hoat-dong-nhu-the-nao-6163.html
Jun 22, 2023 - Cryptography là gì và nó hoạt động như thế nào?
cryptography
https://cybersecuritycoalition.be/resource/post-quantum-cryptography-its-time-to-act/
Aug 4, 2025 - Quantum computers are no longer science fiction—they’re becoming a reality. While they promise breakthroughs in fields like medicine and logistics, they...
post quantum cryptographytimeactbelgium
https://riscv.org/blog/tyrca-a-risc-v-tightly-coupled-accelerator-for-code-based-cryptography/
Oct 21, 2025 - RISC-V International Staff RISC-V International’s staff bring together expertise from multiple disciplines to advance our mission of promoting the RISC-V...
riscvtightlycoupledaccelerator
https://www.brown.edu/news/2022-09-21/cryptography
The federal government selected four algorithms to serve as standards for public key security in the pending era of quantum computers, three of which are based...
brownalgorithmservecryptographystandard
https://www.eenewseurope.com/en/post-quantum-cryptography-and-the-future-of-embedded-security/
Nov 26, 2025 - On December 3, 2025, Elektor is hosting a conference on post-quantum cryptography and its significance for embedded and IoT systems. Ahead of the event, we...
post quantum cryptographyinterviewfutureembedded
https://thehackernews.com/search/label/cryptography
Explore the latest news, real-world incidents, expert analysis, and trends in cryptography — only on The Hacker News, the leading cybersecurity and IT news...
latest newscryptographyreportsanalysishacker
https://www.appviewx.com/blogs/appviewx-quantum-trust-hub-release/
Nov 28, 2025 - Prepare for quantum threats with AppViewX Quantum Trust Hub. Gain full crypto visibility, assess PQC readiness, and migrate to quantum-safe encryption.
trust hubintroducingappviewxquantumlaunchpad
https://www.manning.com/liveproject/public-key-cryptography-with-rsa
As the head of IT at a popup Halloween store, implement the RSA public key encryption algorithm to secure customer data.
public keycryptographyrsarodstephens
https://changelog.com/gotime/295
Filippo Valsorda & Roland Shoemaker from the Go Team sit down with Natalie to catch us up on what's new in Go's crypto libraries. No, not *that*...
newgocryptographylibraries
https://www.keyfactor.com/products/implementing-cryptography/
Aug 10, 2023 - Implement cryptography into your applications with Bouncy Castle open-source cryptographic APIs in Java and C#.
bouncy castleimplementcryptographykeyfactor
https://xiphera.com/services/
Dec 5, 2024 - Xiphera is your expert in security and cryptography. Combining theory and practice with years of expertise. Read about our services here.
servicessecuritycryptography
https://xiphera.com/industries/
Oct 22, 2025 - Across industries with the highest security requirements, Xiphera provides hardware-based cryptography that combines reliability, performance, and long-term...
industriessecuritycryptography
https://gwern.net/doc/cs/cryptography/nash/1955-nash
1955 letters of John Nash and the NSA on a cryptosystem and Nash’s belief that near-perfect cryptography could exploit exponential difficulties.
johnnashcryptographygwernnet
https://paragraph.com/@privacy-scaling-explorations/code-optimizations-in-the-landscape-of-post-quantum-cryptography
Apr 7, 2025 - This post was written by PSE researcher Miha Stopar. There's no doubt that lattice-based cryptography is currently the most promising branch of post-quantum...
post quantum cryptographycodeoptimizationslandscape
https://adguard.info/en/blog/adguard-for-ios-v4-5-15.html
Jan 13, 2026 - We’ve added post-quantum cryptography support to DNS and updated SafariConverterLib to unlock new filtering capabilities.
post quantum cryptographyadguardios
https://www.dcd.pl/product-category/cryptography/
100% safe cryptographic system ready for quantum computing
cryptographyarchivesdcdsemi
https://www.dailydot.com/news/telegram-isis-encryption-cryptography/
May 27, 2021 - Jihadists continue to try to use the app despite its creators banning ISIS-related channels.
cryptographyexpertcastsdoubttelegram
https://www.redhat.com/en/topics/security/post-quantum-cryptography
Learn about Red Hat’s approach to post-quantum cryptography, which refers to encryption algorithms that can resist attacks from quantum computers.
post quantum cryptography
https://www.f5.com/labs/articles/the-state-of-pqc-on-the-web
We analyze the world’s most popular websites and most widely used web browsers to determine the current state of PQC adoption on the web.
post quantum cryptographystatepqcweb
https://rotx.dev/
Your command-line toolbox for managing cryptographic values. Easily generate, version, and share secrets using Shamir Secret Sharing. Rekey to latest...
rotboringcryptographytoolinghumans
https://news.mit.edu/2026/chip-processing-method-could-assist-cryptography-schemes-keep-data-secure-0220
A new fabrication technique enables two chips to share a unique “fingerprint,” allowing one to authenticate the other without the need to store secret key...
chipprocessingmethodcouldassist
https://hackernoon.com/tagged/quantum-cryptography
Read the latest quantum-cryptography stories on HackerNoon, where 10k+ technologists publish stories for 4M+ monthly readers.
quantum cryptographystorieshackernoon
https://cointelegraph.com/news/experts-split-on-practical-implications-of-quantum-cryptography
Jun 28, 2020 - Scientists in China managed to exchange a crypto key at a distance of over 1,000 kilometers, could this lead to hackerproof cryptography?
quantum cryptographyexpertssplitpracticalimplications
https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography
Learn how and when to react to the security threat posed by Quantum Computers with post-quantum cryptography (PQC) or quantum-safe cryptography (QSC).
quantum safecryptographythreat
https://link.springer.com/book/10.1007/978-3-030-75248-4?error=cookies_not_supported&code=635b396f-7370-4763-a9b5-d1815e03619d
The PKC 2021 proceedings focus on all aspects of public-key cryptography, covering theory, implementations and applications.
public keyinternational conferencecryptography
https://www.esat.kuleuven.be/cosic/
Jan 16, 2025 - Welcome to the website of the COSIC (Computer Security and Industrial Cryptography) research group, based in Leuven.
computer securityindustrialcryptography
https://christopherwolfram.com/projects/cryptography-wl/
I was the primary developer of the original cryptography functions shipped with every copy of Wolfram Language (Mathematica) since 2015 (version 10.1). Those...
cryptographysystemwl
https://www.keepersecurity.com/blog/2023/06/07/what-is-elliptic-curve-cryptography/
Sep 16, 2025 - Security expert, Teresa Rothaar explains what Elliptic Curve Cryptography (ECC) is in simple terms, how it works, its benefits and common ECC use cases.
elliptic curve cryptographyexplainedsimpleterms
https://link.springer.com/book/10.1007/978-3-319-70500-2?error=cookies_not_supported&code=7159db4b-d6b6-4937-ad83-c661467d82fb
This conference proceeding refers about the theory of cryptography, preferably with influence also in other areas of cryptography, theory, and beyond.
international conferencebaltimore mdtheorycryptographytcc
https://link.springer.com/book/10.1007/978-3-030-03810-6?error=cookies_not_supported&code=4635fdb7-fe11-46ca-8f44-1cb48541dda4
The TCC 2018 proceedings focus on the theory of cryptography. The papers of Part II deal with topics such as MPC protocols; order-revealing encryption and...
international conferencetheorycryptographytccindia
https://elie.net/talk/deep-cryptanalysis-fashion-or-revolution
This keynote discusses whether applying deep-learning to cryptanalysis will revolutionize the field or if it will go out of fashion in a few years due to the...
deepfashionrevolutionworkshopattacks
https://utimaco.com/resources/downloads/ebooks/your-essential-ebook-post-quantum-cryptography
In this eBook, we’ll break down the urgent need for PQC, the choice of algorithms, and how to make a successful transition before quantum computers become a...
post quantum cryptographyessentialebookutimaco
https://www.nist.gov/blogs/taking-measure/post-quantum-cryptography-qa-nists-matt-scholl
Quantum computing algorithms seek to use quantum phenomena to perform certain types of calculations much more efficiently than today’s classical, binary
post quantum cryptographyampmatt
https://www.nist.gov/cybersecurity/what-post-quantum-cryptography
Read on for some answers to common questions about this developing technology and NIST’s efforts.
post quantum cryptographynist
https://riscv.org/blog/a-risc-v-based-accelerator-for-post-quantum-cryptography/
Nov 3, 2025 - RISC-V International Staff RISC-V International’s staff bring together expertise from multiple disciplines to advance our mission of promoting the RISC-V...
post quantum cryptographyriscvbasedaccelerator