Engineering tech blog from SandboxAQ.

An Appetizer to CRYPTO 2024


This blog post describes the main idea of each of our three papers that have been accepted at CRYPTO 2024.
Read more ⟶

Cybersecurity Chronicles: RWPQC to RSA


This blogpost discusses the Real World PQC workshop we hosted in March 2024 in Toronto, followed by our teams attendance and participation at RSA in May.
Read more ⟶

EUROCRYPT 2024


This blogpost describes the papers, presentations, and attendees from the SandboxAQ cybersecurity group at the IACR flagship conference Eurocrypt 2024.
Read more ⟶

A report from the Fifth PQC Standardization Conference


A blog post from our attendence and participation at the 5th NIST PQC Standardization conference which took place on April 10-12 2024 in Maryland, USA
Read more ⟶

Federated Learning for Enhanced Network Security


This post explains the concept of federated learning in cross-silo settings and its potential use-cases for network security applications.
Read more ⟶

To attest or not to attest, this is the question


This post gives a brief explanation of our research paper about attestation in FIDO2.
Read more ⟶

Turbo charging the TLS handshake with Sandwich


A walkthrough of how we implemented TurboTLS using Sandwich, and how you can try it out for yourself.
Read more ⟶

Quantum Cookie Cutting: an algorithm for finding the smallest shape in high dimensional spaces


This blogpost describes work that encoded a hard lattice problem, $K$-DSP, into a quantum Hamiltonian, with implications for lattice cryptography.
Read more ⟶

How to Build Secure Tunnels with Sandwich in Python


In this post, we will take a deep dive into the three ingredients that make up a perfect Sandwich: context-time configuration, tunnel-time configuration, and an I/O interface. We'll take a look at how each ingredient adds its unique flavor to the mix, and how they all come together to create a secure and efficient tunnel.
Read more ⟶

Fully Homomorphic Encryption: Introduction and Use-Cases


This blog is an introduction to FHE. Rather than diving into mathematical details, we aim to provide to the reader a higher level overview of what FHE can be used for, and the different scenarios or setups that leverage FHE.
Read more ⟶