quantum-computing

3 articles
sort: new top best
clear filter
0 6/10

An IETF working group (PLANTS) is developing post-quantum cryptography solutions for HTTPS certificate authentication and transparency, addressing the challenge of 40x larger certificates through Merkle tree-based proofs and inverted certificate transparency log architecture.

IETF Let's Encrypt ISRG ML-DSA-44 Ed25519 PLANTS LWN.net
lwn.net · firexcy · 2 days ago · details · hn
0 2/10

Scott Aaronson debunks the "JVG algorithm" which claimed massive improvements over Shor's factoring algorithm by showing its core flaw: while it trades quantum computation for classical precomputation, the precomputation step itself requires exponential time to compute and load exponentially many values, making it hopeless for large numbers despite appearing to work on tiny inputs.

JVG algorithm Shor's algorithm RSA-2048 Scott Aaronson Cleve and Watrous 2000 arXiv Preprints.org
scottaaronson.blog · jhalderm · 4 days ago · details · hn
0 2/10

Article discusses the 'harvest now, decrypt later' threat where attackers collect encrypted data today for future decryption using quantum computers, emphasizing the need for post-quantum cryptography preparation.

thehackernews.com · [email protected] (The Hacker News) · 9 days ago · details