Post Quantum Crypto

Stumbled upon this today: To stop quantum hackers, the US just chose these four quantum-resistant encryption algorithms | ZDNet

so thought to create a general topic for future reference. I’ll edit in some more links later.

While writing the P2SH bulletin post-quantum section which focused on hash functions I dug up some literature:

2 Likes