Blogposts

  • Isabel Marco Martínez (PONSIP)

    10/03/2025

    Strategies for Spreading Key Exploitable Results

    Categories: Posts

    Key Exploitable Results (KERs) represent research or development outcomes with significant potential for industrial application and commercialization.

  • QUBIP Innovation Manager

    05/02/2025

    Vlog – Episode#7

    Categories: Vlogs

    News from the Post-Quantum world

  • Grazia D’Onghia and Antonio Lioy (POLITO)

    16/01/2025

    Integrity Verification

    Categories: Posts

    Integrity Verification techniques are vital for maintaining trust in modern computing environments. These mechanisms include secure boot, measured boot, and remote attestation.

  • QUBIP Innovation Manager

    02/01/2025

    Vlog – Episode#6

    Categories: Vlogs

    News from the Post-Quantum world

  • Javier Faba (UPM)

    03/12/2024

    Hybridization for Quantum-Secure IPsec

    Categories: Posts

    The hybridization of quantum and post-quantum cryptographic keys is an optimal solution that ensures secure, flexible, and efficient key derivation in a post-quantum world.

  • Antonio Pastor (Telefonica)

    04/11/2024

    IPSec and the impact of the Quantum Era

    Categories: Posts

    IPSec is conceived as an extension of the IP protocol to provide security capacities, including origin authentication, integrity, confidentiality, and anti-replay services.