News

The cybersecurity world is on the brink of a revolution, driven by quantum computing. Quantum computers can also break the ...
Several hash functions have been presented to replace previous standard hash families SHA-1 and SHA-2. Besides resistance to cryptanalysis, new candidates should feature a good flexibility to be ...