Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Crypto
      • Cyber
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 20 Mar

        Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

      • 06 Mar

        The Triple Cyber Threat: Borat RAT

    20 Mar

    Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

    06 Mar

    The Triple Cyber Threat: Borat RAT

    View all
    • English
    • Italiano
    The One-Way And Trapdoor Functions: The Heart Of Modern Encryption
    14 Dec

    Introduction A one-way function is, by definition, a mathematical function that is easy to calculate but computationally difficult to invert. In other words, inverting a one-way function is equivalent to...

    Read more
    Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC)
    14 Nov

    Today the quantum attacks threat is a real danger. The protection of data and communications is linked to technologies that give future-proof answers, capable of thwarting threats with still partially...

    Read more
    Secure communications: end-to-end encryption (E2EE)
    28 Oct

    End-to-end encryption is a message encryption method based on asymmetric encryption algorithms and the decentralization of cryptographic keys. Is an encrypted communication system in which only people who are communicating...

    Read more
    Digital signature algorithms: present and future
    21 Oct

    Abstract The digital signature is, in many respects, the analogue in the digital world of the handwritten signature that we all use on a daily basis. The main difference between...

    Read more
    Videoconference and security
    03 Oct

    In a historical moment in which virtual meetings are becoming the main means of communication, both in the workplace and in the school environment, it is necessary and essential to...

    Read more
    Key Negotiation in the Post-Quantum Era
    09 Sep

    Introduction Cryptography, understood as the set of information protection schemes, is typically divided into symmetric or private key cryptography and asymmetric or public key cryptography. Schemes or protocols that exploit...

    Read more
    Cryptophones: what they are and how they work
    05 Sep

    The issue of mobile communication security highlights one of the weak links in the security chain of organizations. It is often the behavior of individual employees, not necessarily malicious but...

    Read more
    Leon Battista Alberti’s cipher disk
    18 Jul

    Leon Battista Alberti’s cipher disk, described in “De cifris” around 1467, is the first polyalphabetic encryption system. The device consists of two concentric discs, rotating relative to each other, containing...

    Read more
    Post-Quantum Cryptography (PQC): a classical solution to the quantum threat
    13 Jul

    Introduction Public key (or asymmetric) cryptography is one of the bases on which all communication protocols rest which, starting from an insecure channel, must achieve multiple security properties, such as...

    Read more
    The Caesar cipher
    07 Feb

    In cryptography, the Caesar cipher is one of the oldest cryptographic algorithms of which there is a historical trace. It is a mono-alphabetic substitution cipher, in which each letter of...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Phone

    +39 011 77 14 343

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2022 Telsy SpA con unico socio Gruppo TIM • P.IVA 00737690016 • REA TO443365