Post-Quantum Cryptography Insights
Post-Quantum Cryptography Insights
Reading Path
Post-quantum migration is not a single library upgrade. It requires inventory, risk ranking, protocol review, vendor coordination, hybrid transition planning, testing, and long-term cryptographic agility.
Use this page as a guided path through the cryptography and PQC material on this site.
Foundations
-
Quantum Computing for Software Engineers: A Practical Introduction
The technical background needed to understand why asymmetric cryptography is exposed. -
Introduction to lattice based cryptography
A compact introduction to lattice-based constructions and the intuition behind quantum resistance.
NIST Algorithms
- ML-KEM: A Practical Introduction to the Post-Quantum Key Encapsulation Mechanism
- SHL-DSA: A Practical Introduction to the Post-Quantum Signature Algorithm
Migration Strategy
- Post-Quantum Cryptography Migration: A Comprehensive Strategy Guide
- QTLS: Building Quantum-Safe TLS for the Post-Quantum Era
Consulting Relevance
A practical PQC engagement should produce a cryptographic inventory, risk-ranked migration plan, hybrid strategy, vendor-readiness view, and implementation guidance for the systems that matter most.
Cryptography & Post-Quantum Security services describe how I approach that work.