Posts

  • Marco Russo (Politecnico di Torino)

    14/04/2025

    CRQC, a 2025 perspective

    Categories: Posts

    Cryptographically Relevant Quantum Computers (CRQCs) are quantum computing systems capable of executing quantum algorithms, such as Shor's algorithm, at scales sufficient to break modern public-key cryptosystems such as RSA and ECC.

  • Isabel Marco Martínez (PONSIP)

    10/03/2025

    Strategies for Spreading Key Exploitable Results

    Categories: Posts

    Key Exploitable Results (KERs) represent research or development outcomes with significant potential for industrial application and commercialization.

  • Grazia D’Onghia and Antonio Lioy (POLITO)

    16/01/2025

    Integrity Verification

    Categories: Posts

    Integrity Verification techniques are vital for maintaining trust in modern computing environments. These mechanisms include secure boot, measured boot, and remote attestation.

  • Javier Faba (UPM)

    03/12/2024

    Hybridization for Quantum-Secure IPsec

    Categories: Posts

    The hybridization of quantum and post-quantum cryptographic keys is an optimal solution that ensures secure, flexible, and efficient key derivation in a post-quantum world.

  • Antonio Pastor (Telefonica)

    04/11/2024

    IPSec and the impact of the Quantum Era

    Categories: Posts

    IPSec is conceived as an extension of the IP protocol to provide security capacities, including origin authentication, integrity, confidentiality, and anti-replay services.

  • Carlo Sanna (Politecnico di Torino)

    12/09/2024

    Post-Quantum Verifiable Credentials

    Categories: Posts

    This blogpost explores verifiable credentials and how our project is working to transition them to the post-quantum world.