Engineering tech blog from SandboxAQ.

EUROCRYPT 2024


This blogpost describes the papers, presentations, and attendees from the SandboxAQ cybersecurity group at the IACR flagship conference Eurocrypt 2024.
Read more ⟶

A report from the Fifth PQC Standardization Conference


A blog post from our attendence and participation at the 5th NIST PQC Standardization conference which took place on April 10-12 2024 in Maryland, USA
Read more ⟶

Federated Learning for Enhanced Network Security


This post explains the concept of federated learning in cross-silo settings and its potential use-cases for network security applications.
Read more ⟶

To attest or not to attest, this is the question


This post gives a brief explanation of our research paper about attestation in FIDO2.
Read more ⟶

Turbo charging the TLS handshake with Sandwich


A walkthrough of how we implemented TurboTLS using Sandwich, and how you can try it out for yourself.
Read more ⟶

Quantum Cookie Cutting: an algorithm for finding the smallest shape in high dimensional spaces


This blogpost describes work that encoded a hard lattice problem, $K$-DSP, into a quantum Hamiltonian, with implications for lattice cryptography.
Read more ⟶

How to Build Secure Tunnels with Sandwich in Python


In this post, we will take a deep dive into the three ingredients that make up a perfect Sandwich: context-time configuration, tunnel-time configuration, and an I/O interface. We'll take a look at how each ingredient adds its unique flavor to the mix, and how they all come together to create a secure and efficient tunnel.
Read more ⟶

Fully Homomorphic Encryption: Introduction and Use-Cases


This blog is an introduction to FHE. Rather than diving into mathematical details, we aim to provide to the reader a higher level overview of what FHE can be used for, and the different scenarios or setups that leverage FHE.
Read more ⟶

All the Things PQ – End-to-End PQ-Secure Fido2 Protocol


This post introduces the first end-to-end post-quantum secure implementation of the FIDO2 protocol, which we have recently open-sourced.
Read more ⟶

When AI meets Cybersecurity


This article provides an overview the intersection of artificial intelligence and cybersecurity, which has led to a new era of both promise and peril.
Read more ⟶