About 3,640 results
Open links in new tab
  1. Post-Quantum Cryptography Recommendations for TLS-based …

    Feb 26, 2025 · Consequently, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms. These algorithms are designed to remain …

  2. NIST Releases First 3 Finalized Post-Quantum Encryption Standards

    Aug 13, 2024 · NIST has released a final set of encryption tools designed to withstand the attack of a quantum computer. These post-quantum encryption standards secure a wide range of …

  3. Post-quantum cryptography - Wikipedia

    Data that is currently not quantum-safe, whether it is stores or transmitted, and that must remain confidential for a long time, may be compromised in the future by quantum computers …

  4. NIST's Post-Quantum Cryptography Standards Are Here - IEEE …

    Aug 13, 2024 · With these standards in hand, NIST is encouraging computer system administrators to begin transitioning to post-quantum security as soon as possible.

  5. Post-Quantum Cryptography | CSRC

    Jan 3, 2017 · NIST’s Post-Quantum Cryptography (PQC) project leads the national and global effort to secure electronic information against the future threat of quantum …

  6. Post-quantum cryptography (PQC) · Cloudflare SSL/TLS docs

    Oct 29, 2025 · Get an overview of how Cloudflare is deploying post-quantum cryptography to protect you against harvest now, decrypt later.

  7. Learn More About Post-Quantum Security - Palo Alto Networks

    This topic provides links to information to help you increase your understanding, preparation, and transition to post-quantum security in your business.

  8. draft-ietf-uta-pqc-app-00 - Post-Quantum Cryptography …

    Sep 18, 2025 · * Post-Quantum Algorithm: An asymmetric cryptographic algorithm designed to be secure against attacks from both quantum and classical computers. An example of a post …

  9. Preparing for Post Quantum Cryptography | security - Oracle Blogs

    Nov 18, 2025 · The challenge is to come up with cryptographic infrastructure capable of operating on traditional computers and resistant to attacks from both traditional and quantum computers. …

  10. This process, which involved contributions from numerous scientists and institutions worldwide, culminated in the publication of three quantum-safe encryption algorithms in 2024. These …