Engineering tech blog from SandboxAQ.

Number Theoretic Transform - A Gentle Introduction: Part I


In this blog post, we will take a look at polynomial multiplication and view it from the perspective of convolutions. This sets the stage for why we need NTT.
Read more ⟶

Keep Calm and Carry On: the recent side-channel attacks on Kyber


This post covers recent research results on side-channel attacks on Kyber, a post-quantum cryptography cryptosystem.
Read more ⟶

When Crypto-agility Meets Cybersecurity: Challenges and Opportunities


In this post, we delve a bit more into the relationship between crypto-agility and cybersecurity.
Read more ⟶

Adventures in PQC: Exploring Kyber in Python - Part I


In this blog post, we are going to go through some of the fundamentals of Module LWE, and build up KYBER from scratch step-by-step.
Read more ⟶

Is FIDO2 Ready for the Quantum Era?


This post will explain recent research results about whether the de facto standard for passwordless authentication, called the FIDO2 protocol, is 'quantum-ready'.
Read more ⟶

Lighting the Signal


In this post we will explain the core idea behind a recently published attack against one kind of key exchange protocol. Specifically, we will discuss "signal leakage attacks" against key exchange protocols, which are based on the Learning with Errors (LWE) problem under "key re-use".
Read more ⟶

Recent Updates in PQC and Why We Should Learn to Love Cryptanalysis


This year, some of the most notable and groundbreaking cryptanalysis attacks were made public. In this post we delve a bit more into the main takeaways of these cryptanalysis results.
Read more ⟶