Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 03 Nov

        The mathematics behind PQC: the codes

      • 16 Oct

        New post-quantum digital signature proposals: the second NIST competition

    The mathematics behind PQC: the codes

    New post-quantum digital signature proposals: the second NIST competition

    View all
    • English
    • Italiano
    Post-Quantum Cryptography (PQC): a classical solution to the quantum threat
    13 Jul

    Introduction Public key (or asymmetric) cryptography is one of the bases on which all communication protocols rest which, starting from an insecure channel, must achieve multiple security properties, such as...

    Read more
    The logical qubit and the correction of quantum errors
    18 May

    Introduction: Physical Qubit vs Logical Qubit As discussed in the previous article, the unit of information processed by a quantum computer is generically called Qubit or Quantum Bit. However, for...

    Read more
    Al-Kindi, the father of cryptanalysis
    04 Apr

    Abu Yūsuf Yaʻqūb ibn ʼIsḥāq aṣ-Ṣabbāḥ al-Kindi was born in 801 in Kufa or Basra, Iraq, and died in Baghdad in 873. He is known as “the philosopher of the...

    Read more
    Shor’s Quantum Algorithm
    29 Mar

    Introduction Among the numerous applications of the quantum computing model, the most relevant in the cryptographic field is represented by the work of the American computer scientist Peter W. Shor....

    Read more
    The Caesar cipher
    07 Feb

    In cryptography, the Caesar cipher is one of the oldest cryptographic algorithms of which there is a historical trace. It is a mono-alphabetic substitution cipher, in which each letter of...

    Read more
    Grover’s Quantum Algorithm
    04 Feb

    Introduction With the 1996 article “A fast quantum mechanical algorithm for database search,” Indian-American computer scientist Lov K. Grover helped highlight the non-negligible impact of quantum computing on cryptography in...

    Read more
    The cipher of Aeneas
    03 Jan

    In the sacred texts, in particular in the Old Testament, three main secret writings can be found: the Atbash, the Albam and the Atbah. The first cipher code, Atbash, was...

    Read more
    The Qubit: introduction to quantum algorithms
    27 Dec

    Introduction Sometimes, in popular settings, the quantum computer is labeled as a particular “incredibly faster” computer. Although this consideration is not entirely far from reality, it is necessary to make...

    Read more
    History of cryptography: the scitala
    29 Nov

    The scitala or scital (in ancient Greek: σκυτάλη, skytàlē, “stick”) is traditionally considered an encrypted and secret message that was sent by the ephors, the five supreme magistrates of Sparta,...

    Read more
    The Quantum Computing
    26 Nov

    Introduction At the end of the last century, the field of experimental physics was revolutionized by the technological development of classical computers. Among the numerous innovations, the possibility of computer...

    Read more

    Posts navigation

    Older posts
    Newer posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Whistleblowing
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Contacts

    Phone
    +39 011 77 14 343

    Mail
    contact@telsy.it

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2021 Telsy SpA company with a single shareholder TIM Group • VAT 00737690016 • REA TO443365