Telsy
    • About Us
    • Solutions
      • Go to Solutions
      • Cyber
      • Crypto
      • Quantum
    • Innovation
    • Markets
    • Careers
    • Blog
    • Featured News
      • 27 Mar

        The Math Behind PQC: Learning With Errors

      • 20 Mar

        Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

    27 Mar

    The Math Behind PQC: Learning With Errors

    20 Mar

    Security Awareness: how to avoid the dangers of cybersecurity with TelsySkills

    View all
    • English
    • Italiano
    The Math Behind PQC: Learning With Errors
    27 Mar

    Introduction Some of the winning cryptographic schemes in the NIST standardization process belonging to the latex-based cryptography family are constructed from a problem called Learning With Errors (LWE). Given a...

    Read more
    The mathematics behind PQC: lattices
    15 Feb

    Introduction A large number of post-quantum cryptography schemes are built on a mathematical structure called “lattice“, on which hard-to-solve problems can be defined even for a quantum computer. Cryptosystems belonging...

    Read more
    Quantum Key Distribution (QKD) and security
    12 Dec

    In the collective imagination, quantum computing has been relegated to science fiction for many years, but thanks to recent developments in technologies and substantial investments by major players, we are...

    Read more
    Key Negotiation in the Post-Quantum Era
    09 Sep

    Introduction Cryptography, understood as the set of information protection schemes, is typically divided into symmetric or private key cryptography and asymmetric or public key cryptography. Schemes or protocols that exploit...

    Read more
    Post-Quantum Cryptography (PQC): a classical solution to the quantum threat
    13 Jul

    Introduction Public key (or asymmetric) cryptography is one of the bases on which all communication protocols rest which, starting from an insecure channel, must achieve multiple security properties, such as...

    Read more
    Shor’s Quantum Algorithm
    29 Mar

    Introduction Among the numerous applications of the quantum computing model, the most relevant in the cryptographic field is represented by the work of the American computer scientist Peter W. Shor....

    Read more
    Grover’s Quantum Algorithm
    04 Feb

    Introduction With the 1996 article “A fast quantum mechanical algorithm for database search,” Indian-American computer scientist Lov K. Grover helped highlight the non-negligible impact of quantum computing on cryptography in...

    Read more
    The Quantum Computing
    26 Nov

    Introduction At the end of the last century, the field of experimental physics was revolutionized by the technological development of classical computers. Among the numerous innovations, the possibility of computer...

    Read more
    Telsy has recently entered into Quantum Telecommunications Italy
    02 Aug

    Telsy has recently completed its entry into Quantum Telecommunications Italy (QTI) with a minority stake in the share capital of this startup active in the field of quantum fiber optic...

    Read more
    War and cryptography: the challenge of quantum communication
    16 Jun

    Message encryption has always been a very important tool within the military, stretching back to the time of the ancient Greeks to the present day. It is natural for two...

    Read more

    Posts navigation

    Older posts
    Find out more
    About us
    Solutions
    Careers
    Blog
    Governance
    Privacy Policy
    Comment Policy
    Operational Offices

    Turin
    Corso Svizzera, 185, 10149

    Rome
    Via del Pellegrino, 155, 00186
    Via Antonio Nibby, 4-6, 00161

    Naples
    Centro Direzionale, Isola F7, 80143

    Commercial Office

    Milan
    Via Gaetano Negri, 1, 20123

    Phone

    +39 011 77 14 343

    Follow us
    tim group
    tim group
    logo zero
    logo zero
    © 2020 Telsy SpA con unico socio Gruppo TIM • P.IVA 00737690016 • REA TO443365