Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 09 Mar

        Iranian conflict and cyber warfare, attacks in Italy, LeakBase and Tycoon 2FA disrupted

      • 27 Feb

        Latest from Italy, updates in the APT landscape, multiple vulnerabilities exploited ITW

    Iranian conflict and cyber warfare, attacks in Italy, LeakBase and Tycoon 2FA disrupted

    Latest from Italy, updates in the APT landscape, multiple vulnerabilities exploited ITW

    View all
    • English
    • Italiano
    SQIsign: the isogeny-based digital signature proposed to NIST
    08 Sep

    Introduction Among the digital signatures submitted in 2023 to the NIST call in the post-quantum standardization process, the only proposal based on isogenies is SQIsign (Short Quaternion Isogeny Signature). Unique...

    Read more
    The applications of isogenies in Post Quantum Cryptography
    14 Jul

    After introducing the theory of elliptic curves and defining the necessary tools, we present some classical schemes in isogeny-based cryptography. As mentioned in the previous article, this part of Post...

    Read more
    Post-Quantum Cryptography for Embedded Systems: Challenges and Accelerator Integration over RISC-V Architecture
    28 Apr

    Introduction Information security has taken an increasingly crucial and pervasive role, particularly for embedded systems, which are low-power, resource-constrained devices involved in critical applications such as automotive, IoT and industrial...

    Read more
    Multivariate signatures based on identification schemes
    15 Feb

      Introduction The goal of an identification protocol is to enable the verification of someone’s identity. More specifically, a Prover must demonstrate to an interlocutor, called the Verifier, that they...

    Read more
    UOV and its Variants: Digital Signatures Based on Multivariate Systems
    24 Nov

    In the previous exploration of multivariate cryptography, we examined how systems of polynomial equations over finite fields can form the basis for cryptographic schemes resistant to quantum computing attacks. The...

    Read more
    The Mathematics behind PQC: Multivariate Polynomials
    14 Oct

    Introduction Multivariate cryptography, along with lattice-based, code-based and hash-based cryptosystems, is one of the primary classes of cryptographic schemes resistant to quantum attacks. These schemes are based on the difficulty...

    Read more
    SPHINCS+: stateless hash-based digital signature
    26 Aug

    Introduction The Forest Of Random Subset (FORS) scheme constitutes the last element needed in order to describe the complete structure of the SPHINCS+ digital signature algorithm, selected at the end...

    Read more
    XMSS: hash-based stateful digital signature
    01 Jul

    Introduction XMSS (eXtended Merkle Signature Scheme) represents a fundamental component of the SPHINCS+’s construction, which is a post-quantum hash-based digital signature selected in the NIST standardization process. As a standalone...

    Read more
    The Mathematics behind PQC: hash functions
    06 May

    Introduction After analyzing in detail the Post Quantum algorithms that base their security on mathematical problems defined over lattices (Kyber, Dilithium, Falcon) and on error correcting codes (Classic McEliece), we...

    Read more
    The math behind the PQC: Syndrome Decoding Problem
    11 Dec

    Introduction Cryptographic schemes starring in the NIST standardization process belonging to the code-based cryptography family are constructed from a problem called the Decoding Problem. Given a code and a vector,...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Accessibility
    GDPR Information Notice
    Courtesy page
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Orvieto
    Via delle Acacie, 17, 05018 Ciconia (TR)

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    Telsy Gruppo TIM 1
    CO2 Green Label Telsy TIM
    © 2023 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365