Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
TM RedHotCyber 970x120 042543

Author: Tara Lie

Tara Lie

Cyber Security manager from Perth, Western Australia, focused on governance, risk quantification and compliance. Graduate of cyber security and pure mathematics, with a second-major in Italian Studies. Tara has earned a Master's degree in Cyber Security, and is pursuing her PhD researching cyber security in the post-quantum era.

Profilo LinkedIn
Numero di articoli trovati: 6

NIST selects second PQC Key Encapsulation algorithm

The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to...

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future

Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based...

Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.

Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not able to quickly decompose a large number into prime factors....

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia

Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist,...

Discover Quantum Computing

Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of...

Signal towards the Future: Post Quantum Cryptography now protects our messages

Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making it resistant to future attacks...