Post-Quantum

Google's commitment to a quantum-safe future: Why PQC is Google's path forward and not QKD

An overview of Google's strategy for transitioning to post-quantum cryptography.

From Inventory to Agility: A CISO's Guide to Robust Key Management

A guide for CISOs on how to build a robust and agile key management strategy.

Cryptographic Agility and Key Rotation

A deep dive into the importance of cryptographic agility and key rotation in modern systems.

Why Hybrid Deployments Are Key to Secure PQC Migration

Exploring the role of hybrid cryptographic deployments in the migration to post-quantum cryptography.

Google's Threat model for Post-Quantum Cryptography

Understanding the threat model that drives Google's approach to post-quantum cryptography.

Post-quantum Cryptography at Google

Google is actively involved in the development and deployment of post-quantum cryptography (PQC). In this talk, we will share our perspective on the migration to PQC, including our …

avatar
Stefan Kölbl

Why Google now uses post-quantum cryptography for internal comms

An explanation of why and how Google has started using post-quantum cryptography for its internal communications.

Haraka

A short-input hash function optimized for high performance on platforms supporting [AES-NI](https://en.wikipedia.org/wiki/AES_instruction_set). Used in …

SPHINCS+ / SLH-DSA

SPHINCS+ is a stateless hash-based signature scheme standardized as FIPS 205.