Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Assumed attackers owning quantum computers probably have much better “Address DB” than yours.

As for regular assessment of your secure infrastructure, you can read latest “Algorithms, Key Size and Protocols Report”:

https://www.ecrypt.eu.org/csa/documents/D5.4-FinalAlgKeySize...

and practical part of ENISA report:

https://www.enisa.europa.eu/publications/post-quantum-crypto...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: