So What’s A Modulus In Post Quantum Cryptography?
Published in
7 min readNov 15, 2022
If you are into cybersecurity or secure software development, you may have learned about public key encryption and of the methods that were created around the end of the 1970s and in the 1980s. Well, you may just have to learn some more theory — as the methods you learnt could be under threat from quantum computers.