What if your most sensitive data became accessible in an instant? The growing excitement about the advent of quantum computers is justified for a subject that is no longer science fiction but involves a new kind of threat. Indeed, according…
Author: Johann Plüss
Quantum computing threatens today’s asymmetric cryptography and would render current algorithms obsolete, both RSA and ECC. As for symmetric cryptography, (AES, hash functions) doubling the key size ensures maintained security guarantees. To address the threat, the NIST has standardized three…
This summer's post-quantum news: what you need to know This summer marks a major breakthrough in cybersecurity with the publication of the NIST standards for post-quantum cryptography. This publication is the culmination of many years of work, the standardisation process…
Swiss Cyber Startups Position Themselves for Trustworthy AI Every year, since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. The year 2024 marks the takeoff of AI security – a critical year, characterized by the exponential progress…