May 10, 2024, 3:18 a.m. |

IACR News www.iacr.org

ePrint Report: A New Cryptographic Algorithm

Ali Mahdoum


The advent of quantum computing technology will compromise many of the current cryptographic algorithms, especially public-key cryptography, which is widely used to protect digital information. Most algorithms on which we depend are used worldwide in components of many different communications, processing, and storage systems. Once access to practical quantum computers becomes available, all public-key algorithms and associated protocols will be vulnerable to criminals, competitors, and other adversaries. It is critical to begin …

access algorithm algorithms communications components compromise computing cryptographic cryptographic algorithm cryptographic algorithms cryptography current digital digital information eprint report information key protect public public-key cryptography quantum quantum computing report storage storage systems systems technology

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC