
Sign up to save your podcasts
Or
Topics in this episode:
* The emerging threat of quantum computers and their impact on Cryptography
* How NIST’s standardization process works, briefly, and why you don’t need to trust NIST at all.
* How you might upgrade messaging protocols to the Post-Quantum age
* Implementing Post-Quantum key exchanges with deniable signatures
* How much metadata can a centralized E2E messaging server record?
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.
Topics in this episode:
* The emerging threat of quantum computers and their impact on Cryptography
* How NIST’s standardization process works, briefly, and why you don’t need to trust NIST at all.
* How you might upgrade messaging protocols to the Post-Quantum age
* Implementing Post-Quantum key exchanges with deniable signatures
* How much metadata can a centralized E2E messaging server record?
If you enjoyed this episode, and want to get notified when the next one arrives, feel free to subscribe:
If you want even more updates, feel free to follow me on Twitter.