2026-04-10 11:56Z The Quantum Insider score 40 Insider Brief Actually, don’t stick a fork in Bitcoin. While quantum computing poses a known threat to Bitcoin, a new proposal suggests the network could defend itself without changing its core protocol.
2026-04-10 06:24Z CoinDesk score 39 XRP may be less exposed to quantum computer threats than bitcoin, experts say
2026-04-09 17:22Z arXiv score 88 When a user sends a message over a wireless network, the message does not travel as-is. It is encrypted, authenticated, encapsulated, and transformed as it descends the protocol stack from the application layer to the physical medium.
2026-04-09 01:30Z arXiv score 54 The rapid deployment of AI agents acting autonomously on behalf of human principals has outpaced the development of cryptographic protocols for establishing, bounding, and revoking human-AI trust relationships.
2026-04-08 20:12Z arXiv score 40 Maximal Extractable Value, or MEV, remains a structural threat to blockchain fairness because a block producer can often observe pending transactions and unilaterally decide their ordering or inclusion.
2026-04-08 17:44Z Decrypt score 55 New research and industry timelines are accelerating efforts to replace cryptography that quantum computers could eventually break.
2026-04-08 16:05Z Hacker News score 86 Post-Quantum Cryptography for the PHP Community
2026-04-08 11:06Z arXiv score 100 Ensuring ciphertext indistinguishability is fundamental to cryptographic security, but empirically validating this property in real implementations and hybrid settings presents practical challenges.
2026-04-07 21:36Z Hacker News score 86 Towards Post-Quantum Cryptography in TLS (2019)
2026-04-07 20:56Z Hacker News score 40 Bitcoin and quantum computing
2026-04-07 17:13Z arXiv score 76 Post-quantum migration in TLS 1.3 should not be understood as a flat substitution problem in which one signature algorithm is replaced by another and deployment cost is inferred directly from primitive-level benchmarks.
2026-04-07 08:48Z arXiv score 100 We present a layered and modular network architecture that combines Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC) to provide scalable end-to-end security across long distance multi-hop, trusted-node quantum networks.
2026-04-05 17:17Z arXiv score 74 Post-quantum signature schemes such as ML-DSA-65 produce signatures of 3,309 bytes and public keys of 1,952 bytes over 50 times larger than classical Ed25519.
2026-04-04 09:32Z arXiv score 100 This paper studies how post-quantum cryptographic (PQC) security assumptions can be represented and communicated through a structured, layered framework that is useful for technical interpretation but does not replace formal cryptographic p
2026-04-03 18:22Z Hacker News score 45 Quantum computer researchers: Bitcoin encryption breakable in a few years
2026-04-03 12:18Z Hacker News score 35 Factoring is not a good benchmark to track Q-day
2026-04-02 17:52Z arXiv score 100 Solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) is critical for evaluating the quantum security of widely deployed elliptic-curve cryptosystems.
2026-04-02 08:19Z Hacker News score 86 Why full-stack post-quantum cryptography cannot wait
2026-04-01 14:33Z Hacker News score 30 Reducing Shor's algorithm T-count via Z/6Z tensor network
2026-04-01 13:14Z Hacker News score 40 Google Paper Warns of Quantum Computing Risk for Bitcoin
2026-04-01 07:10Z arXiv score 100 The impending arrival of cryptographically relevant quantum computers (CRQCs) threatens the security foundations of modern software: Shor's algorithm breaks RSA, ECDSA, ECDH, and Diffie-Hellman, while Grover's algorithm reduces the effectiv
2026-04-01 03:06Z Hacker News score 40 Google warns quantum computing may break Bitcoin earlier than thought
2026-03-31 06:44Z Hacker News score 30 Shor's algorithm is possible with as few as 10k reconfigurable atomic qubits
2026-03-31 02:03Z Google Research score 34 Algorithms & Theory
2026-03-30 17:59Z arXiv score 100 This whitepaper seeks to elucidate implications that the capabilities of developing quantum architectures have on blockchain vulnerabilities and mitigation strategies.
2026-03-30 16:10Z arXiv score 100 Quantum computers have the potential to perform computational tasks beyond the reach of classical machines.
2026-03-30 16:09Z arXiv score 100 The transition to a cloud-native 5G Service-Based Architecture (SBA) improves scalability but exposes control-plane signaling to emerging quantum threats, including Harvest-Now, Decrypt-Later (HNDL) attacks.
2026-03-27 18:34Z arXiv score 100 This paper considers two challenges faced by practical quantum networks: the bootstrapping of seedless Quantum Random Number Generators (QRNGs) and the resilient combination of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (Q
2026-03-26 14:53Z arXiv score 100 Bitcoin already faces a quantum threat through Shor attacks on elliptic-curve signatures. This paper isolates the other component that public discussion often conflates with it: mining.
2026-03-26 13:13Z Hacker News score 86 Google sets a timeline for post-quantum cryptography migration to 2029
2026-03-26 05:26Z arXiv score 100 With the rapid evolution of the Industrial Internet of Things (IIoT), the boundaries and scale of the Internet are continuously expanding.
2026-03-23 15:37Z arXiv score 30 Deploying ML-DSA (FIPS 204) in threshold settings has remained an open problem: the scheme's inherently non-linear rounding step defeats the additive share techniques that underpin practical threshold schemes for elliptic-curve signatures s
2026-03-20 17:29Z arXiv score 92 Hamming Quasi-Cyclic (HQC) was chosen for the latest post-quantum cryptography standardization. A concatenated Reed-Muller (RM) and Reed-Solomon (RS) code is decoded during the HQC decryption.
2026-03-19 16:35Z arXiv score 98 Post-quantum cryptography currently rests on a small number of hardness assumptions, posing significant risks should any one of them be compromised.
2026-03-19 11:27Z arXiv score 100 The migration to post-quantum cryptography is urgent for Internet of Things devices with 10--20 year lifespans, yet no systematic benchmarks exist for the finalised NIST standards on the most constrained 32-bit processor class.
2026-03-16 05:07Z arXiv score 39 Quantum computing provides the feasible multi-layered security challenges to classical blockchain systems.
2026-03-09 14:39Z Hacker News score 86 Post-Quantum Cryptography Beyond TLS: Remain Quantum Safe
2026-02-26 16:04Z Hacker News score 32 I built CIFER, a distributed encryption + access-control system designed so that no component ever holds a complete decryption key at rest.<p>Core idea: each “secret” (per user or per dataset) has its own independent post-quantum keypair.
2026-02-24 18:58Z Hacker News score 72 AI agents are making decisions that affect money, infrastructure, and users — but most systems rely on editable logs.<p>I built PiQrypt to explore whether an AI agent can have a cryptographically verifiable decision history.<p>Each event is
2026-02-12 05:21Z arXiv score 48 Quantum Byzantine Agreement (QBA), a cornerstone of quantum blockchain, offers inherent advantages in security and fault tolerance over classical protocols, guaranteed by the laws of quantum mechanics.