Engineering tech blog from SandboxAQ.
Real-World Verification of Software for Cryptographic Applications
In this blog post, we describe how we at SandboxAQ, together with Cryspen, formally verified key components of Sandwich—an open-source, unified API that simplifies the use of cryptographic libraries for developers, enabling crypto-agility.
Read more ⟶Surveying public keys used on the Internet
This post describes a survey of 20 million public keys from diverse sources on the Internet and cryptographic weaknesses found.
Read more ⟶Protecting Signal Keys on Desktop
This blogpost describes our investigation and proof of concept to enhance the security of Signal Messenger key management on desktop.
Read more ⟶When in ROM, do as the quantum attackers do: Part I
This blogpost serves as a gentle introduction to a widely used security model for analyzing real-world post-quantum cryptosystems, including the recent NIST standards, called the "quantum random oracle model".
Read more ⟶Formally-Verified Post-Quantum Cryptography: An Overview
This blog post gives an overview of the area of formally verified cryptography and SandboxAQ's activities in this area.
Read more ⟶An Appetizer to CRYPTO 2024
This blog post describes the main idea of each of our three papers that have been accepted at CRYPTO 2024.
Read more ⟶Cybersecurity Chronicles: RWPQC to RSA
This blogpost discusses the Real World PQC workshop we hosted in March 2024 in Toronto, followed by our teams attendance and participation at RSA in May.
Read more ⟶EUROCRYPT 2024
This blogpost describes the papers, presentations, and attendees from the SandboxAQ cybersecurity group at the IACR flagship conference Eurocrypt 2024.
Read more ⟶A report from the Fifth PQC Standardization Conference
A blog post from our attendence and participation at the 5th NIST PQC Standardization conference which took place on April 10-12 2024 in Maryland, USA
Read more ⟶Federated Learning for Enhanced Network Security
This post explains the concept of federated learning in cross-silo settings and its potential use-cases for network security applications.
Read more ⟶