Cyber Chronicles: Under the Surface – Defending Critical Infrastructure in the Age of OT Cyber Threats

Electricity, water, transport, and manufacturing—these are the pillars of our society, powered by complex operational technology (OT) systems that most…

Article 12 – Quantum Leap: Multivariate Cryptography: A Multifaceted Approach to Post-Quantum Security

Multivariate cryptography is a diverse field that utilizes multivariate polynomials over finite fields to construct cryptographic primitives. This approach offers…

Article 11 – Quantum Leap: Code-Based Cryptography: A Journey into Error-Correcting Codes

Code-based cryptography leverages the mathematical properties of error-correcting codes to construct cryptographic primitives. Error-correcting codes are powerful tools used to…

Article 10 – Quantum Leap: The Societal Implications of Post-Quantum Cryptography

The advent of quantum computing poses a significant threat to the security of our digital world. However, the development of…