Author: Johann Plüss

Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues?

What if your most sensitive data became accessible in an instant? The growing excitement about the advent of quantum computers is justified for a subject that is no longer science fiction but involves a new kind of threat. Indeed, according…

2025 Radar of Post Quantum Safety Solutions 

Quantum computing threatens today’s asymmetric cryptography and would render current algorithms obsolete, both RSA and ECC. As for symmetric cryptography, (AES, hash functions) doubling the key size ensures maintained security guarantees. To address the threat, the NIST has standardized three…

Post-quantum cryptography is here: what are the consequences and actions for large organisations? 

This summer's post-quantum news: what you need to know  This summer marks a major breakthrough in cybersecurity with the publication of the NIST standards for post-quantum cryptography. This publication is the culmination of many years of work, the standardisation process…

Back to top