1 min read
EU Mandates Post-Quantum Cryptography by 2030 – Five Years Ahead of US
The EU and US now agree on which post-quantum algorithms to use – NIST FIPS 203/204/205 – but not when they must be deployed.
 
                  
                
                1 min read
The EU and US now agree on which post-quantum algorithms to use – NIST FIPS 203/204/205 – but not when they must be deployed.
 
                  
                
                8 min read
OpenSSL 3.5 introduces three post-quantum primitives - ML-DSA, SLH-DSA and ML-KEM - all standardized in FIPS-203/204/205 and believed to withstand...
 
                  
                
                5 min read
*Cryptomathic - originally published 16 May 2023; Updated 20 May 2025* Quantum computers offer transformational power for complex computational...
 
                  
                
                4 min read
 Stefan Hansen:  24. March 2023
                    
                    Stefan Hansen:  24. March 2023
                  Large-scale quantum computing is coming soon, and with that comes new cybersecurity threats. One of these threats is "steal now, decrypt later,"...
 
                  
                
                3 min read
When it comes to preparing for post-quantum computing, the legacy mechanisms for effective implementation, integration, and management of...
 
                  
                
                3 min read
This article discusses how prepared companies are for quantum computing cybersecurity risks based on a recent Deloitte poll and what the current...
 
                  
                
                2 min read
 Edlyn Teske:  09. August 2022
                    
                    Edlyn Teske:  09. August 2022
                  Just a month ago, NIST announced its selection of three digital signature algorithms and one key establishment mechanism (KEM) for future use in...
 
                  
                
                3 min read
 Edlyn Teske:  22. July 2022
                    
                    Edlyn Teske:  22. July 2022
                  An over five-year-long process has come to a preliminary end: On July 5, 2022, NIST issued the long-awaited announcement of the winners of Round 3 of...
 
                  
                
                3 min read
Cryptography is the backbone of data security technology. In this article, Jo Lintzen, MD at Cryptomathic Inc. explains the preparations for...