Engineering tech blog from SandboxAQ.

# When in ROM, do as the quantum attackers do: Part I

This blogpost serves as a gentle introduction to a widely used security model for analyzing real-world post-quantum cryptosystems, including the recent NIST standards, called the "quantum random oracle model".

Read more ⟶# Formally-Verified Post-Quantum Cryptography: An Overview

This blog post gives an overview of the area of formally verified cryptography and SandboxAQ's activities in this area.

Read more ⟶# An Appetizer to CRYPTO 2024

This blog post describes the main idea of each of our three papers that have been accepted at CRYPTO 2024.

Read more ⟶# Cybersecurity Chronicles: RWPQC to RSA

This blogpost discusses the Real World PQC workshop we hosted in March 2024 in Toronto, followed by our teams attendance and participation at RSA in May.

Read more ⟶# EUROCRYPT 2024

This blogpost describes the papers, presentations, and attendees from the SandboxAQ cybersecurity group at the IACR flagship conference Eurocrypt 2024.

Read more ⟶# A report from the Fifth PQC Standardization Conference

A blog post from our attendence and participation at the 5th NIST PQC Standardization conference which took place on April 10-12 2024 in Maryland, USA

Read more ⟶# Federated Learning for Enhanced Network Security

This post explains the concept of federated learning in cross-silo settings and its potential use-cases for network security applications.

Read more ⟶# To attest or not to attest, this is the question

This post gives a brief explanation of our research paper about attestation in FIDO2.

Read more ⟶# Turbo charging the TLS handshake with Sandwich

A walkthrough of how we implemented TurboTLS using Sandwich, and how you can try it out for yourself.

Read more ⟶# Quantum Cookie Cutting: an algorithm for finding the smallest shape in high dimensional spaces

This blogpost describes work that encoded a hard lattice problem, $K$-DSP, into a quantum Hamiltonian, with implications for lattice cryptography.

Read more ⟶