HackerNews
A Guide to Post-Quantum Cryptography
A Guide to Post-Quantum Cryptography
The Trail of Bits Blog
A Guide to Post-Quantum Cryptography
For many high-assurance applications such as TLS traffic, medical databases, and blockchains, forward secrecy is absolutely essential. It is not sufficient to prevent an attacker from immediately decrypting sensitive information. Here the threat model encompasses…
TheVerge
These two books look at a pair of sci-fi s most influential projects and their flawed creators
These two books look at a pair of sci-fi s most influential projects and their flawed creators
The Verge
These two books look at a pair of sci-fi’s most influential projects and their flawed creators
Histories of 2001: A Space Odyssey and Astounding Science Fiction and how they shaped the modern genre