Hacker News new | past | comments | ask | show | jobs | submit login

> That being said, the processes described in the article sound like they will arrive at a fairly transparent (in a good sense), publicly-vetted algorithm

Or a family of them for different applications anyway, which increases chances both that a) at least one of them is actually quantum resistant and b) at least one of them will have a flaw exploitable by even classical computers.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: