Engineering tech blog from SandboxAQ.
This post covers recent research results on side-channel attacks on Kyber, a post-quantum cryptography cryptosystem.Read more ⟶
In this post, we delve a bit more into the relationship between crypto-agility and cybersecurity.Read more ⟶
In this blog post, we are going to go through some of the fundamentals of Module LWE, and build up KYBER from scratch step-by-step.Read more ⟶
This post will explain recent research results about whether the de facto standard for passwordless authentication, called the FIDO2 protocol, is 'quantum-ready'.Read more ⟶
In this post we will explain the core idea behind a recently published attack against one kind of key exchange protocol. Specifically, we will discuss "signal leakage attacks" against key exchange protocols, which are based on the Learning with Errors (LWE) problem under "key re-use".Read more ⟶
This year, some of the most notable and groundbreaking cryptanalysis attacks were made public. In this post we delve a bit more into the main takeaways of these cryptanalysis results.Read more ⟶