News

The new algorithm behaves well on a much broader range. “I’m really happy someone did it,” said Thomas Espitau, a cryptography researcher at the company PQShield and an author of the 2021 ...
In this version of the solution, we still generate a unique 128-bit dynamic key by combining the hardcoded key (K2) with properties of the device via a CMAC algorithm. However, we have replaced an ...
A factorization method known as Shor’s algorithm makes it theoretically possible to solve these types of problems. That, in turn, means certain death for many of the cryptographic schemes now ...