Secure on Paper: Attacking Post-Quantum Cryptography in Practice
The transition to post-quantum cryptography is well underway. Driven by the recognition that Shor's algorithm would render all widely deployed asymmetric cryptosystems insecure in the presence of a sufficiently capable quantum computer, the cryptographic community has spent the past decade designing, evaluating, and standardizing a new generation of public-key primitives. In 2024, ML-KEM became th
