• Feb 20, 2019
  • Derek Zimmer
  • Cybersecurity, Encryption, General Privacy News,

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

In the first article of this series, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)”

0

  • Feb 13, 2019
  • Derek Zimmer
  • Cybersecurity, Encryption, General Privacy News,

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the algorithms against one … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)”

0