Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 19 May

        The Mathematics behind PQC: Isogenies of Elliptic Curves

      • 12 May

        Web reputation e social engineering: mutual influence and impacts on the business

    The Mathematics behind PQC: Isogenies of Elliptic Curves

    Web reputation e social engineering: mutual influence and impacts on the business

    View all
    • English
    • Italiano
    The Mathematics behind PQC: Isogenies of Elliptic Curves
    19 May

    Elliptic curves cryptography After presenting the main PQC algorithms based on lattices, error correcting codes, hash functions, and multivariate systems, this article is focused on the topic of isogenies of...

    Read more
    XMSS: hash-based stateful digital signature
    01 Jul

    Introduction XMSS (eXtended Merkle Signature Scheme) represents a fundamental component of the SPHINCS+’s construction, which is a post-quantum hash-based digital signature selected in the NIST standardization process. As a standalone...

    Read more
    The Mathematics behind PQC: hash functions
    06 May

    Introduction After analyzing in detail the Post Quantum algorithms that base their security on mathematical problems defined over lattices (Kyber, Dilithium, Falcon) and on error correcting codes (Classic McEliece), we...

    Read more
    Classic McEliece: key encapsulation based on codes
    26 Feb

    Introduction At the end of the third round of the NIST standardization process, the CRYSTALS-Kyber key encapsulation method aimed at replacing the current ECDH scheme was selected. NIST then defined...

    Read more
    The math behind the PQC: Syndrome Decoding Problem
    11 Dec

    Introduction Cryptographic schemes starring in the NIST standardization process belonging to the code-based cryptography family are constructed from a problem called the Decoding Problem. Given a code and a vector,...

    Read more
    The mathematics behind PQC: the codes
    03 Nov

    Introduction In addition to lattices, the foundation of lattice-based cryptography, another mathematical structure used to construct post-quantum cryptography schemes is error-correcting codes, more briefly codes. The codes originated in the...

    Read more
    Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC)
    14 Nov

    Today the quantum attacks threat is a real danger. The protection of data and communications is linked to technologies that give future-proof answers, capable of thwarting threats with still partially...

    Read more
    Post-Quantum Cryptography (PQC): a classical solution to the quantum threat
    13 Jul

    Introduction Public key (or asymmetric) cryptography is one of the bases on which all communication protocols rest which, starting from an insecure channel, must achieve multiple security properties, such as...

    Read more
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Telsy Gruppo TIM 1
    Carbon offset_WEBSITE_2024
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    © 2022 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365