Towards A Quantum World: Hash to Obtain Random Subset (HORS)

Sometime soon we will have to ween ourselves on many of your public key encryption methods. On the Ethereum infrastructure, we sign for transactions using an elliptic curve based private key. Unfortunately elliptic curves will be crackable by quantum computers, so we must thus find method which still allow us to define signatures. One way is to create a hash-based method with public…

--

--

--

This publication brings together interesting articles related to cyber security.

Recommended from Medium

An Email That You Need To Be Careful — Phishing

Revolutionizing DeFi Interaction With DefiGram

How Is Payment Gateway Useful For The E-commerce And Non-E-commerce Industry?

How Is Payment Gateway Useful For The E-commerce And Non E-commerce Industry?

Understanding Shared Proxies With TheSocialProxyProxy.

Foreign Cyber Operations: Ryuk Ransomware Group

What is the scope of the GDPR ?

Top 10 Security Courses for Your Team

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

EBSI — The Grand Data Vision: Building Bridges and Not Walls

Will Quantum Computing ‘Future-Proof’ Crypto?

In Research, “Do what interests you the most” and “Stay curious”