Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 18 Jan

        Developments in the APT landscape, new campaigns and previously unseen malware, multiple data breaches reported

      • 09 Jan

        Critical vulnerabilities in n8n, Italy in the crosshairs of phishing and ransomware activity, the latest from China

    Developments in the APT landscape, new campaigns and previously unseen malware, multiple data breaches reported

    Critical vulnerabilities in n8n, Italy in the crosshairs of phishing and ransomware activity, the latest from China

    View all
    • English
    • Italiano
    HQC: key encapsulation based on codes
    17 Nov

    Introduction In 2022, the third round conclusion of the NIST standardization process on post-quantum cryptography selected a key encapsulation mechanism (CRYSTALS-Kyber/ML-KEM), three digital signature schemes (CRYSTALS-Dilithium/ML-DSA, Falcon/FN-DSA and SPHINCS+/SLH-DSA) and opened a fourth round devoted to evaluating an additional...

    Read more
    SPHINCS+: stateless hash-based digital signature
    26 Aug

    Introduction The Forest Of Random Subset (FORS) scheme constitutes the last element needed in order to describe the complete structure of the SPHINCS+ digital signature algorithm, selected at the end...

    Read more
    XMSS: hash-based stateful digital signature
    01 Jul

    Introduction XMSS (eXtended Merkle Signature Scheme) represents a fundamental component of the SPHINCS+’s construction, which is a post-quantum hash-based digital signature selected in the NIST standardization process. As a standalone...

    Read more
    Future-proof cryptography: the security of TelsyMusa
    10 Jun

    Ensuring proper security standards for our systems and servers has never been more essential. This need, coupled with the growth rate of cyber threats and, more importantly, the increasingly various...

    Read more
    The Mathematics behind PQC: hash functions
    06 May

    Introduction After analyzing in detail the Post Quantum algorithms that base their security on mathematical problems defined over lattices (Kyber, Dilithium, Falcon) and on error correcting codes (Classic McEliece), we...

    Read more
    Security for offline conversations: TelsyATMO
    05 Feb

    Protecting our data and communications from cyber risks is, now more than ever, extremely important to secure the content we exchange.   In fact, many dangers can lurk around the corner,...

    Read more
    CRYSTALS-Dilithium: LWE-based digital signature
    31 May

    Introduction NIST’s Post-Quantum standardization process identified two cryptographic schemes to be intended as “primary” solutions. With regard to Key Encapsulation Mechanisms (KEMs), key derivation schemes, CRYSTALS-Kyber was selected, while from...

    Read more
    CRYSTALS-Kyber: LWE-based key encapsulation
    08 May

    Abstract In the context of the NIST standardization process for identifying and analyzing Post-Quantum Cryptography (PQC) solutions, the first crucial outcome is the selection of the key encapsulation mechanism (KEM)...

    Read more
    The Math Behind PQC: Learning With Errors
    27 Mar

    Introduction Some of the winning cryptographic schemes in the NIST standardization process belonging to the latex-based cryptography family are constructed from a problem called Learning With Errors (LWE). Given a...

    Read more
    Quantum Key Distribution (QKD) and security
    12 Dec

    In the collective imagination, quantum computing has been relegated to science fiction for many years, but thanks to recent developments in technologies and substantial investments by major players, we are...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Accessibility
    GDPR Information Notice
    Courtesy page
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    Telsy Gruppo TIM 1
    SITO WEB_emissioni CO2e compensate_2024
    SITO WEB_emissioni CO2e compensate_2024
    © 2022 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365