News

"These algorithms should cover most devices that have these sorts of resource constraints." ASCON was selected as the best of the 57 proposals submitted to NIST, several rounds of security ...
This step is the foundation of the entire encryption algorithm, as the quantum key map will be used to store the encryption key. During preparation, the security and stability of the quantum key ...