dice.camp is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon server for RPG folks to hang out and talk. Not owned by a billionaire.

Administered by:

Server stats:

1.6K
active users

#postquantumcrypto

0 posts0 participants0 posts today
Fiona :transbian: :autism: @WHY2025 DECT: 3591<p>The paper I co-authored (“A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography”) was accepted for publication by “EPJ Quantum Technology” today. 😊<span><br><br></span><a href="https://eprint.iacr.org/2025/173" rel="nofollow noopener" target="_blank">You can find the preprint here</a><span>, Nick will eventually update it with the final changes.<br><br>In short: We looked into existing use-cases for </span><a href="https://blahaj.zone/tags/QuantumKeyDistribution" rel="nofollow noopener" target="_blank">#QuantumKeyDistribution</a><span> and whether they make any sense and did so as a joint team between people with a QKD-background and cryptographers who started out very critical of QKD. (I’m firmly in the latter camp.)<br><br>My personal summary (though some of my co-authors won’t share it to this extend): </span><a href="https://blahaj.zone/tags/QKD" rel="nofollow noopener" target="_blank">#QKD</a><span> is bullshit and not useful for practical purposes as it stands.<br><br></span><a href="https://blahaj.zone/tags/crypto" rel="nofollow noopener" target="_blank">#crypto</a> <a href="https://blahaj.zone/tags/cryptography" rel="nofollow noopener" target="_blank">#cryptography</a> <a href="https://blahaj.zone/tags/cryptology" rel="nofollow noopener" target="_blank">#cryptology</a> <a href="https://blahaj.zone/tags/postquantumcrypto" rel="nofollow noopener" target="_blank">#postquantumcrypto</a> <a href="https://blahaj.zone/tags/PQC" rel="nofollow noopener" target="_blank">#PQC</a></p>
xyhhx 🔻 (plz hire me)<p>huh, that's neat. just discovered <span class="h-card" translate="no"><a href="https://ioc.exchange/@cryspen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cryspen</span></a></span>'s libcrux: <a href="https://github.com/cryspen/libcrux" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/cryspen/libcrux</span><span class="invisible"></span></a></p><p>i found it while looking for implementations of ml-kem</p><p><a href="https://nso.group/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://nso.group/tags/postQuantumCrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postQuantumCrypto</span></a> <a href="https://nso.group/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://nso.group/tags/pqc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pqc</span></a> <a href="https://nso.group/tags/mlkem" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mlkem</span></a> <a href="https://nso.group/tags/kyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kyber</span></a></p>
🏳️‍⚧️ Fiona :flag_lesbian:<p>One of the most infuriating things about <a href="https://tech.lgbt/tags/QuantumComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumComputing</span></a> related stuff is that <a href="https://tech.lgbt/tags/QuantumComputers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumComputers</span></a> being theoretically able to break factoring and DLog (aka: most asymmetric crypto in current use) using Shor’s algorithm is used as a selling point for <a href="https://tech.lgbt/tags/QuantumCryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumCryptography</span></a> (QC) or <a href="https://tech.lgbt/tags/QuantumKeyDistribution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumKeyDistribution</span></a> (<a href="https://tech.lgbt/tags/QKD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QKD</span></a>).</p><p>The two topics really have nothing to do with each other, the solution for dealing with the broken schemes is to replace them with non-broken ones.</p><p>If we want QKD, there has to be a DIFFERENT motivation for it, that has nothing to do with Shor’s algorithm. </p><p>Somehow we have allowed the presentation to become “after classical crypto choose <a href="https://tech.lgbt/tags/PostQuantumCrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantumCrypto</span></a> (<a href="https://tech.lgbt/tags/PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PQC</span></a>) or QKD”, instead of “keep using classical crypto that is secure against known attacks or switch to QKD”.</p><p>In line with that we should also increasingly move to stop talking about PQC, and just talk about secure <a href="https://tech.lgbt/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a>, because that is really all it is.</p><p><a href="https://tech.lgbt/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://tech.lgbt/tags/itsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>itsecurity</span></a></p>
Stefan Gast<p>I had the pleasure to contribute to the <a href="https://infosec.exchange/tags/USENIX2024" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USENIX2024</span></a> paper "Divide and Surrender", recovering the full secret key from the reference implementation of the HQC Key Encapsulation Mechanism, exploiting a timing side channel arising from non-constant-time modulo operations.<br>Thanks to Robin Leander Schröder and Qian Guo for this opportunity and congratulations to Robin Leander Schröder for getting his first paper accepted at USENIX Security!</p><p>You can read the full paper here: <a href="https://stefangast.eu/papers/divide_and_surrender.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stefangast.eu/papers/divide_an</span><span class="invisible">d_surrender.pdf</span></a></p><p><a href="https://infosec.exchange/tags/divideandsurrender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>divideandsurrender</span></a> <a href="https://infosec.exchange/tags/hqc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hqc</span></a> <a href="https://infosec.exchange/tags/sidechannel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sidechannel</span></a> <a href="https://infosec.exchange/tags/postquantumcrypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postquantumcrypto</span></a> <a href="https://infosec.exchange/tags/usenixsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>usenixsecurity</span></a></p>