Telsy
    To search, type something and press "enter"
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Careers
    • Blog
    • Featured News
      • 09 Mar

        Iranian conflict and cyber warfare, attacks in Italy, LeakBase and Tycoon 2FA disrupted

      • 27 Feb

        Latest from Italy, updates in the APT landscape, multiple vulnerabilities exploited ITW

    Iranian conflict and cyber warfare, attacks in Italy, LeakBase and Tycoon 2FA disrupted

    Latest from Italy, updates in the APT landscape, multiple vulnerabilities exploited ITW

    View all
    • English
    • Italiano
    Future-proof cryptography: the security of TelsyMusa
    10 Jun

    Ensuring proper security standards for our systems and servers has never been more essential. This need, coupled with the growth rate of cyber threats and, more importantly, the increasingly various...

    Read more
    Classic McEliece: key encapsulation based on codes
    26 Feb

    Introduction At the end of the third round of the NIST standardization process, the CRYSTALS-Kyber key encapsulation method aimed at replacing the current ECDH scheme was selected. NIST then defined...

    Read more
    New post-quantum digital signature proposals: the second NIST competition
    16 Oct

    Introduction In July 2023, NIST announced four winning algorithms in the post-quantum competition, marking an important step forward in the transition process. The selected algorithms were CRYSTALS-Kyber for key negotiation...

    Read more
    Falcon: digital signature based on NTRU
    31 Jul

    Introduction NIST’s Post-Quantum standardization process has identified two cryptographic schemes based on lattice theory within digital signatures: CRYSTALS-Dilithium and Falcon. Within modern cryptographic communication protocols, these solutions will replace the...

    Read more
    CRYSTALS-Dilithium: LWE-based digital signature
    31 May

    Introduction NIST’s Post-Quantum standardization process identified two cryptographic schemes to be intended as “primary” solutions. With regard to Key Encapsulation Mechanisms (KEMs), key derivation schemes, CRYSTALS-Kyber was selected, while from...

    Read more
    CRYSTALS-Kyber: LWE-based key encapsulation
    08 May

    Abstract In the context of the NIST standardization process for identifying and analyzing Post-Quantum Cryptography (PQC) solutions, the first crucial outcome is the selection of the key encapsulation mechanism (KEM)...

    Read more
    The Math Behind PQC: Learning With Errors
    27 Mar

    Introduction Some of the winning cryptographic schemes in the NIST standardization process belonging to the latex-based cryptography family are constructed from a problem called Learning With Errors (LWE). Given a...

    Read more
    The mathematics behind PQC: lattices
    15 Feb

    Introduction A large number of post-quantum cryptography schemes are built on a mathematical structure called “lattice“, on which hard-to-solve problems can be defined even for a quantum computer. Cryptosystems belonging...

    Read more
    Key Negotiation in the Post-Quantum Era
    09 Sep

    Introduction Cryptography, understood as the set of schemes for protecting information, is typically divided into symmetric or private key cryptography and asymmetric or public key cryptography. Symmetric encryption involves schemes...

    Read more
    Post-Quantum Cryptography (PQC): a classical solution to the quantum threat
    13 Jul

    Introduction Public key cryptography (or asymmetric cryptography) is one of the foundations on which all communication protocols are based. Starting from an insecure channel, these protocols must achieve multiple security...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Cookie Policy
    Comment Policy
    Whistleblowing
    Accessibility
    GDPR Information Notice
    Courtesy page
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via Bartolomeo Marliano, 27, 00162
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F6, 80143

    Orvieto
    Via delle Acacie, 17, 05018 Ciconia (TR)

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    Telsy Gruppo TIM 1
    CO2 Green Label Telsy TIM
    © 2022 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365