<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>ternarycrypto</title><description>Live monitoring feed for the quantum-crypto intersection. Crawled, scored, published.</description><link>https://ternarycrypto.com/</link><language>en-us</language><item><title>[40] New Proposal Claims Quantum-Safe Bitcoin Without a Fork</title><link>https://thequantuminsider.com/2026/04/10/quantum-safe-bitcoin-fork/</link><guid isPermaLink="true">https://thequantuminsider.com/2026/04/10/quantum-safe-bitcoin-fork/</guid><description>Insider Brief Actually, don&amp;#8217;t stick a fork in Bitcoin. While quantum computing poses a known threat to Bitcoin, a new proposal suggests the network could defend itself without changing its core protocol.

source: The Quantum Insider · relevance score: 40</description><pubDate>Fri, 10 Apr 2026 11:56:11 GMT</pubDate><category>feed</category><category>the-quantum-insider</category></item><item><title>[39] XRP may be less exposed to quantum computer threats than bitcoin, experts say</title><link>https://www.coindesk.com/tech/2026/04/10/xrp-may-be-less-exposed-to-quantum-threats-than-bitcoin-experts-say</link><guid isPermaLink="true">https://www.coindesk.com/tech/2026/04/10/xrp-may-be-less-exposed-to-quantum-threats-than-bitcoin-experts-say</guid><description>XRP may be less exposed to quantum computer threats than bitcoin, experts say

source: CoinDesk · relevance score: 39</description><pubDate>Fri, 10 Apr 2026 06:24:28 GMT</pubDate><category>feed</category><category>coindesk</category></item><item><title>[note] Why I&apos;m tracking the quantum threat to Bitcoin</title><link>https://ternarycrypto.com/notes/why-im-tracking-the-quantum-threat-to-bitcoin</link><guid isPermaLink="true">https://ternarycrypto.com/notes/why-im-tracking-the-quantum-threat-to-bitcoin</guid><description>The quantum threat to Bitcoin stopped being theoretical in March. Here&apos;s why I built a monitoring feed instead of another newsletter.</description><pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate><category>notes</category><category>bitcoin</category><category>pqc</category><category>thesis</category></item><item><title>[weekly] Weekly digest — 2026-W15</title><link>https://ternarycrypto.com/weekly/2026-w15</link><guid isPermaLink="true">https://ternarycrypto.com/weekly/2026-w15</guid><description>15 items across 5 sources. Top score 100. Dominant themes: mixed — no dominant theme this week.</description><pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate><category>weekly</category></item><item><title>[88] Post-Quantum Cryptographic Analysis of Message Transformations Across the Network Stack</title><link>https://arxiv.org/abs/2604.08480v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.08480v1</guid><description>When a user sends a message over a wireless network, the message does not travel as-is. It is encrypted, authenticated, encapsulated, and transformed as it descends the protocol stack from the application layer to the physical medium.

source: arXiv · relevance score: 88</description><pubDate>Thu, 09 Apr 2026 17:22:47 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[54] AITH: A Post-Quantum Continuous Delegation Protocol for Human-AI Trust Establishment</title><link>https://arxiv.org/abs/2604.07695v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.07695v1</guid><description>The rapid deployment of AI agents acting autonomously on behalf of human principals has outpaced the development of cryptographic protocols for establishing, bounding, and revoking human-AI trust relationships.

source: arXiv · relevance score: 54</description><pubDate>Thu, 09 Apr 2026 01:30:28 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[40] MEV-ACE: Identity-Authenticated Fair Ordering for Proposer-Controlled MEV Mitigation</title><link>https://arxiv.org/abs/2604.07568v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.07568v1</guid><description>Maximal Extractable Value, or MEV, remains a structural threat to blockchain fairness because a block producer can often observe pending transactions and unilaterally decide their ordering or inclusion.

source: arXiv · relevance score: 40</description><pubDate>Wed, 08 Apr 2026 20:12:06 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[55] Cloudflare Targets 2029 for Quantum-Safe Internet as Threat to Bitcoin Looms</title><link>https://decrypt.co/363654/cloudflare-targets-2029-quantum-safe-internet-threat-bitcoin-looms</link><guid isPermaLink="true">https://decrypt.co/363654/cloudflare-targets-2029-quantum-safe-internet-threat-bitcoin-looms</guid><description>New research and industry timelines are accelerating efforts to replace cryptography that quantum computers could eventually break.

source: Decrypt · relevance score: 55</description><pubDate>Wed, 08 Apr 2026 17:44:54 GMT</pubDate><category>feed</category><category>decrypt</category></item><item><title>[86] Post-Quantum Cryptography for the PHP Community</title><link>https://paragonie.com/blog/2026/04/post-quantum-cryptography-for-php-community</link><guid isPermaLink="true">https://paragonie.com/blog/2026/04/post-quantum-cryptography-for-php-community</guid><description>Post-Quantum Cryptography for the PHP Community

source: Hacker News · relevance score: 86</description><pubDate>Wed, 08 Apr 2026 16:05:34 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[100] Evaluating PQC KEMs, Combiners, and Cascade Encryption via Adaptive IND-CPA Testing Using Deep Learning</title><link>https://arxiv.org/abs/2604.06942v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.06942v1</guid><description>Ensuring ciphertext indistinguishability is fundamental to cryptographic security, but empirically validating this property in real implementations and hybrid settings presents practical challenges.

source: arXiv · relevance score: 100</description><pubDate>Wed, 08 Apr 2026 11:06:05 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[86] Towards Post-Quantum Cryptography in TLS (2019)</title><link>https://blog.cloudflare.com/towards-post-quantum-cryptography-in-tls/</link><guid isPermaLink="true">https://blog.cloudflare.com/towards-post-quantum-cryptography-in-tls/</guid><description>Towards Post-Quantum Cryptography in TLS (2019)

source: Hacker News · relevance score: 86</description><pubDate>Tue, 07 Apr 2026 21:36:42 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[40] Bitcoin and quantum computing</title><link>https://nehanarula.org/2026/04/03/bitcoin-and-quantum-computing.html</link><guid isPermaLink="true">https://nehanarula.org/2026/04/03/bitcoin-and-quantum-computing.html</guid><description>Bitcoin and quantum computing

source: Hacker News · relevance score: 40</description><pubDate>Tue, 07 Apr 2026 20:56:23 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[76] Signature Placement in Post-Quantum TLS Certificate Hierarchies: An Experimental Study of ML-DSA and SLH-DSA in TLS 1.3 Authentication</title><link>https://arxiv.org/abs/2604.06100v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.06100v1</guid><description>Post-quantum migration in TLS 1.3 should not be understood as a flat substitution problem in which one signature algorithm is replaced by another and deployment cost is inferred directly from primitive-level benchmarks.

source: arXiv · relevance score: 76</description><pubDate>Tue, 07 Apr 2026 17:13:10 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] PQC-Enhanced QKD Networks: A Layered Approach</title><link>https://arxiv.org/abs/2604.05599v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.05599v1</guid><description>We present a layered and modular network architecture that combines Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC) to provide scalable end-to-end security across long distance multi-hop, trusted-node quantum networks.

source: arXiv · relevance score: 100</description><pubDate>Tue, 07 Apr 2026 08:48:05 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[74] Merkle Tree Certificate Post-Quantum PKI for Kubernetes and Cloud-Native 5G/B5G Core</title><link>https://arxiv.org/abs/2604.04191v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.04191v1</guid><description>Post-quantum signature schemes such as ML-DSA-65 produce signatures of 3,309 bytes and public keys of 1,952 bytes over 50 times larger than classical Ed25519.

source: arXiv · relevance score: 74</description><pubDate>Sun, 05 Apr 2026 17:17:07 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] Explainable PQC: A Layered Interpretive Framework for Post-Quantum Cryptographic Security Assumptions</title><link>https://arxiv.org/abs/2604.03665v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.03665v1</guid><description>This paper studies how post-quantum cryptographic (PQC) security assumptions can be represented and communicated through a structured, layered framework that is useful for technical interpretation but does not replace formal cryptographic p

source: arXiv · relevance score: 100</description><pubDate>Sat, 04 Apr 2026 09:32:51 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[45] Quantum computer researchers: Bitcoin encryption breakable in a few years</title><link>https://www.heise.de/en/news/Quantum-computer-researchers-Bitcoin-encryption-breakable-in-a-few-years-11244911.html</link><guid isPermaLink="true">https://www.heise.de/en/news/Quantum-computer-researchers-Bitcoin-encryption-breakable-in-a-few-years-11244911.html</guid><description>Quantum computer researchers: Bitcoin encryption breakable in a few years

source: Hacker News · relevance score: 45</description><pubDate>Fri, 03 Apr 2026 18:22:47 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[35] Factoring is not a good benchmark to track Q-day</title><link>https://bas.westerbaan.name/notes/2026/04/02/factoring.html</link><guid isPermaLink="true">https://bas.westerbaan.name/notes/2026/04/02/factoring.html</guid><description>Factoring is not a good benchmark to track Q-day

source: Hacker News · relevance score: 35</description><pubDate>Fri, 03 Apr 2026 12:18:08 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[100] Space-Efficient Quantum Algorithm for Elliptic Curve Discrete Logarithms with Resource Estimation</title><link>https://arxiv.org/abs/2604.02311v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.02311v1</guid><description>Solving the Elliptic Curve Discrete Logarithm Problem (ECDLP) is critical for evaluating the quantum security of widely deployed elliptic-curve cryptosystems.

source: arXiv · relevance score: 100</description><pubDate>Thu, 02 Apr 2026 17:52:00 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[86] Why full-stack post-quantum cryptography cannot wait</title><link>https://blogs.cisco.com/networking/why-full-stack-post-quantum-cryptography-cannot-wait</link><guid isPermaLink="true">https://blogs.cisco.com/networking/why-full-stack-post-quantum-cryptography-cannot-wait</guid><description>Why full-stack post-quantum cryptography cannot wait

source: Hacker News · relevance score: 86</description><pubDate>Thu, 02 Apr 2026 08:19:19 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[30] Reducing Shor&apos;s algorithm T-count via Z/6Z tensor network</title><link>https://github.com/NachoPeinador/Phase-Pi-Quantum-Prior</link><guid isPermaLink="true">https://github.com/NachoPeinador/Phase-Pi-Quantum-Prior</guid><description>Reducing Shor&apos;s algorithm T-count via Z/6Z tensor network

source: Hacker News · relevance score: 30</description><pubDate>Wed, 01 Apr 2026 14:33:04 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[40] Google Paper Warns of Quantum Computing Risk for Bitcoin</title><link>https://www.wsj.com/livecoverage/stock-market-today-dow-sp-500-nasdaq-03-31-2026/card/google-paper-warns-of-quantum-computing-risk-for-bitcoin-x4yBALvF5ezP4R8mk25q</link><guid isPermaLink="true">https://www.wsj.com/livecoverage/stock-market-today-dow-sp-500-nasdaq-03-31-2026/card/google-paper-warns-of-quantum-computing-risk-for-bitcoin-x4yBALvF5ezP4R8mk25q</guid><description>Google Paper Warns of Quantum Computing Risk for Bitcoin

source: Hacker News · relevance score: 40</description><pubDate>Wed, 01 Apr 2026 13:14:22 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[100] Quantum-Safe Code Auditing: LLM-Assisted Static Analysis and Quantum-Aware Risk Scoring for Post-Quantum Cryptography Migration</title><link>https://arxiv.org/abs/2604.00560v1</link><guid isPermaLink="true">https://arxiv.org/abs/2604.00560v1</guid><description>The impending arrival of cryptographically relevant quantum computers (CRQCs) threatens the security foundations of modern software: Shor&apos;s algorithm breaks RSA, ECDSA, ECDH, and Diffie-Hellman, while Grover&apos;s algorithm reduces the effectiv

source: arXiv · relevance score: 100</description><pubDate>Wed, 01 Apr 2026 07:10:17 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[40] Google warns quantum computing may break Bitcoin earlier than thought</title><link>https://www.theblock.co/post/395814/google-quantum-computing-earlier</link><guid isPermaLink="true">https://www.theblock.co/post/395814/google-quantum-computing-earlier</guid><description>Google warns quantum computing may break Bitcoin earlier than thought

source: Hacker News · relevance score: 40</description><pubDate>Wed, 01 Apr 2026 03:06:09 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[30] Shor&apos;s algorithm is possible with as few as 10k reconfigurable atomic qubits</title><link>https://arxiv.org/abs/2603.28627</link><guid isPermaLink="true">https://arxiv.org/abs/2603.28627</guid><description>Shor&apos;s algorithm is possible with as few as 10k reconfigurable atomic qubits

source: Hacker News · relevance score: 30</description><pubDate>Tue, 31 Mar 2026 06:44:42 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[34] Safeguarding cryptocurrency by disclosing quantum vulnerabilities responsibly</title><link>https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/</link><guid isPermaLink="true">https://research.google/blog/safeguarding-cryptocurrency-by-disclosing-quantum-vulnerabilities-responsibly/</guid><description>Algorithms &amp; Theory

source: Google Research · relevance score: 34</description><pubDate>Tue, 31 Mar 2026 02:03:00 GMT</pubDate><category>feed</category><category>google-research</category></item><item><title>[100] Securing Elliptic Curve Cryptocurrencies against Quantum Vulnerabilities: Resource Estimates and Mitigations</title><link>https://arxiv.org/abs/2603.28846v1</link><guid isPermaLink="true">https://arxiv.org/abs/2603.28846v1</guid><description>This whitepaper seeks to elucidate implications that the capabilities of developing quantum architectures have on blockchain vulnerabilities and mitigation strategies.

source: arXiv · relevance score: 100</description><pubDate>Mon, 30 Mar 2026 17:59:25 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] Shor&apos;s algorithm is possible with as few as 10,000 reconfigurable atomic qubits</title><link>https://arxiv.org/abs/2603.28627v1</link><guid isPermaLink="true">https://arxiv.org/abs/2603.28627v1</guid><description>Quantum computers have the potential to perform computational tasks beyond the reach of classical machines.

source: arXiv · relevance score: 100</description><pubDate>Mon, 30 Mar 2026 16:10:08 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] Empowering Mobile Networks Security Resilience by using Post-Quantum Cryptography</title><link>https://arxiv.org/abs/2603.28626v1</link><guid isPermaLink="true">https://arxiv.org/abs/2603.28626v1</guid><description>The transition to a cloud-native 5G Service-Based Architecture (SBA) improves scalability but exposes control-plane signaling to emerging quantum threats, including Harvest-Now, Decrypt-Later (HNDL) attacks.

source: arXiv · relevance score: 100</description><pubDate>Mon, 30 Mar 2026 16:09:56 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] Information-Theoretic Solutions for Seedless QRNG Bootstrapping and Hybrid PQC-QKD Key Combination</title><link>https://arxiv.org/abs/2603.26907v1</link><guid isPermaLink="true">https://arxiv.org/abs/2603.26907v1</guid><description>This paper considers two challenges faced by practical quantum networks: the bootstrapping of seedless Quantum Random Number Generators (QRNGs) and the resilient combination of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (Q

source: arXiv · relevance score: 100</description><pubDate>Fri, 27 Mar 2026 18:34:56 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] Kardashev scale Quantum Computing for Bitcoin Mining</title><link>https://arxiv.org/abs/2603.25519v2</link><guid isPermaLink="true">https://arxiv.org/abs/2603.25519v2</guid><description>Bitcoin already faces a quantum threat through Shor attacks on elliptic-curve signatures. This paper isolates the other component that public discussion often conflates with it: mining.

source: arXiv · relevance score: 100</description><pubDate>Thu, 26 Mar 2026 14:53:46 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[86] Google sets a timeline for post-quantum cryptography migration to 2029</title><link>https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/</link><guid isPermaLink="true">https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/</guid><description>Google sets a timeline for post-quantum cryptography migration to 2029

source: Hacker News · relevance score: 86</description><pubDate>Thu, 26 Mar 2026 13:13:03 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[100] Efficient ML-DSA Public Key Management Method with Identity for PKI and Its Application</title><link>https://arxiv.org/abs/2603.25043v1</link><guid isPermaLink="true">https://arxiv.org/abs/2603.25043v1</guid><description>With the rapid evolution of the Industrial Internet of Things (IIoT), the boundaries and scale of the Internet are continuously expanding.

source: arXiv · relevance score: 100</description><pubDate>Thu, 26 Mar 2026 05:26:31 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[30] TALUS: Threshold ML-DSA with One-Round Online Signing via Boundary Clearance and Carry Elimination</title><link>https://arxiv.org/abs/2603.22109v2</link><guid isPermaLink="true">https://arxiv.org/abs/2603.22109v2</guid><description>Deploying ML-DSA (FIPS 204) in threshold settings has remained an open problem: the scheme&apos;s inherently non-linear rounding step defeats the additive share techniques that underpin practical threshold schemes for elliptic-curve signatures s

source: arXiv · relevance score: 30</description><pubDate>Mon, 23 Mar 2026 15:37:37 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[92] HQC Post-Quantum Cryptography Decryption with Generalized Minimum-Distance Reed-Solomon Decoder</title><link>https://arxiv.org/abs/2603.20156v1</link><guid isPermaLink="true">https://arxiv.org/abs/2603.20156v1</guid><description>Hamming Quasi-Cyclic (HQC) was chosen for the latest post-quantum cryptography standardization. A concatenated Reed-Muller (RM) and Reed-Solomon (RS) code is decoded during the HQC decryption.

source: arXiv · relevance score: 92</description><pubDate>Fri, 20 Mar 2026 17:29:20 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[98] Post-Quantum Cryptography from Quantum Stabilizer Decoding</title><link>https://arxiv.org/abs/2603.19110v1</link><guid isPermaLink="true">https://arxiv.org/abs/2603.19110v1</guid><description>Post-quantum cryptography currently rests on a small number of hardness assumptions, posing significant risks should any one of them be compromised.

source: arXiv · relevance score: 98</description><pubDate>Thu, 19 Mar 2026 16:35:31 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] Benchmarking NIST-Standardised ML-KEM and ML-DSA on ARM Cortex-M0+: Performance, Memory, and Energy on the RP2040</title><link>https://arxiv.org/abs/2603.19340v4</link><guid isPermaLink="true">https://arxiv.org/abs/2603.19340v4</guid><description>The migration to post-quantum cryptography is urgent for Internet of Things devices with 10--20 year lifespans, yet no systematic benchmarks exist for the finalised NIST standards on the most constrained 32-bit processor class.

source: arXiv · relevance score: 100</description><pubDate>Thu, 19 Mar 2026 11:27:29 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[39] Protecting Distributed Blockchain with Twin-Field Quantum Key Distribution: A Quantum Resistant Approach</title><link>https://arxiv.org/abs/2603.14826v1</link><guid isPermaLink="true">https://arxiv.org/abs/2603.14826v1</guid><description>Quantum computing provides the feasible multi-layered security challenges to classical blockchain systems.

source: arXiv · relevance score: 39</description><pubDate>Mon, 16 Mar 2026 05:07:31 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[86] Post-Quantum Cryptography Beyond TLS: Remain Quantum Safe</title><link>https://www.akamai.com/blog/security/post-quantum-cryptography-beyond-tls</link><guid isPermaLink="true">https://www.akamai.com/blog/security/post-quantum-cryptography-beyond-tls</guid><description>Post-Quantum Cryptography Beyond TLS: Remain Quantum Safe

source: Hacker News · relevance score: 86</description><pubDate>Mon, 09 Mar 2026 14:39:34 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[32] Show HN: Cifer, zero-key custody using threshold cryptography</title><link>https://cifer-security.com</link><guid isPermaLink="true">https://cifer-security.com</guid><description>I built CIFER, a distributed encryption + access-control system designed so that no component ever holds a complete decryption key at rest.&lt;p&gt;Core idea: each “secret” (per user or per dataset) has its own independent post-quantum keypair.

source: Hacker News · relevance score: 32</description><pubDate>Thu, 26 Feb 2026 16:04:34 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[72] Show HN: PiQrypt – Cryptographic audit trail for AI agents (Ed25519, Dilithium3)</title><link>https://github.com/PiQrypt/piqrypt</link><guid isPermaLink="true">https://github.com/PiQrypt/piqrypt</guid><description>AI agents are making decisions that affect money, infrastructure, and users — but most systems rely on editable logs.&lt;p&gt;I built PiQrypt to explore whether an AI agent can have a cryptographically verifiable decision history.&lt;p&gt;Each event is

source: Hacker News · relevance score: 72</description><pubDate>Tue, 24 Feb 2026 18:58:40 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[48] Scalable and Highly Fault-Tolerant Circular Quantum Byzantine Agreement</title><link>https://arxiv.org/abs/2602.11592v1</link><guid isPermaLink="true">https://arxiv.org/abs/2602.11592v1</guid><description>Quantum Byzantine Agreement (QBA), a cornerstone of quantum blockchain, offers inherent advantages in security and fault tolerance over classical protocols, guaranteed by the laws of quantum mechanics.

source: arXiv · relevance score: 48</description><pubDate>Thu, 12 Feb 2026 05:21:11 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] [bip-0360.mediawiki] BIP360: Pay to Merkle Root (P2MR) (#1670)</title><link>https://github.com/bitcoin/bips/commit/eae7d9fc57a5f3a2b0c4853c127cb4d27377dbf3</link><guid isPermaLink="true">https://github.com/bitcoin/bips/commit/eae7d9fc57a5f3a2b0c4853c127cb4d27377dbf3</guid><description>Commit by Hunter Beast touching bip-0360.mediawiki in bitcoin/bips. BIP-360 is the post-quantum Pay-to-Merkle-Root proposal. Full commit: https://github.com/bitcoin/bips/commit/eae7d9fc57a5f3a2b0c4853c127cb4d27377dbf3

source: Bitcoin BIPs · relevance score: 100</description><pubDate>Wed, 11 Feb 2026 20:54:26 GMT</pubDate><category>feed</category><category>bitcoin-bips</category></item><item><title>[100] Bitcoin and post-quantum crypto (BIP-341 Taproot and ML-DSA/Falcon, 136 tests)</title><link>https://github.com/emilianosolazzi/PQ-PSBT-WALLET</link><guid isPermaLink="true">https://github.com/emilianosolazzi/PQ-PSBT-WALLET</guid><description>Bitcoin and post-quantum crypto (BIP-341 Taproot and ML-DSA/Falcon, 136 tests)

source: Hacker News · relevance score: 100</description><pubDate>Wed, 11 Feb 2026 02:25:52 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[86] OpenSSH Post-Quantum Cryptography</title><link>https://www.openssh.org/pq.html</link><guid isPermaLink="true">https://www.openssh.org/pq.html</guid><description>OpenSSH Post-Quantum Cryptography

source: Hacker News · relevance score: 86</description><pubDate>Fri, 06 Feb 2026 07:28:24 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[40] Bitcoin&apos;s Quantum Computing Threat</title><link>https://bmpro.substack.com/p/bitcoins-quantum-computing-threat</link><guid isPermaLink="true">https://bmpro.substack.com/p/bitcoins-quantum-computing-threat</guid><description>Bitcoin&apos;s Quantum Computing Threat

source: Hacker News · relevance score: 40</description><pubDate>Fri, 30 Jan 2026 14:30:48 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[100] Show HN: Quantum Vulnerability Database for 3,700 Japanese Public Companies</title><link>https://postqlabs.com</link><guid isPermaLink="true">https://postqlabs.com</guid><description>I built a database that scans SSL&amp;#x2F;TLS configurations of all 3,700+ publicly listed companies in Japan and identifies quantum-vulnerable cryptography.&lt;p&gt;With NIST finalizing PQC standards last year, I wanted to see how prepared Japanese

source: Hacker News · relevance score: 100</description><pubDate>Thu, 29 Jan 2026 05:58:43 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[100] Performance Analysis of Quantum-Secure Digital Signature Algorithms in Blockchain</title><link>https://arxiv.org/abs/2601.17785v1</link><guid isPermaLink="true">https://arxiv.org/abs/2601.17785v1</guid><description>The long-term security of public blockchains strictly depends on the hardness assumptions of the underlying digital signature schemes.

source: arXiv · relevance score: 100</description><pubDate>Sun, 25 Jan 2026 10:52:47 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[86] Post-Quantum Cryptography</title><link>https://en.wikipedia.org/wiki/Post-quantum_cryptography</link><guid isPermaLink="true">https://en.wikipedia.org/wiki/Post-quantum_cryptography</guid><description>Post-Quantum Cryptography

source: Hacker News · relevance score: 86</description><pubDate>Fri, 23 Jan 2026 10:22:51 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[86] RISC-V and Post-Quantum Cryptography</title><link>https://fprox.substack.com/p/risc-v-and-post-quantum-cryptography</link><guid isPermaLink="true">https://fprox.substack.com/p/risc-v-and-post-quantum-cryptography</guid><description>RISC-V and Post-Quantum Cryptography

source: Hacker News · relevance score: 86</description><pubDate>Tue, 20 Jan 2026 12:05:19 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[45] A High-Dimensional Quantum Blockchain Protocol Based on Time- Entanglement</title><link>https://arxiv.org/abs/2512.20489v1</link><guid isPermaLink="true">https://arxiv.org/abs/2512.20489v1</guid><description>Rapid advancements in quantum computing and machine learning threaten the long-term security of classical blockchain systems, whose protection mechanisms largely rely on computational difficulties.

source: arXiv · relevance score: 45</description><pubDate>Tue, 23 Dec 2025 16:31:12 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[48] Verifier-initiated quantum message-authentication via quantum zero-knowledge proofs</title><link>https://arxiv.org/abs/2512.05420v1</link><guid isPermaLink="true">https://arxiv.org/abs/2512.05420v1</guid><description>On-demand authentication is critical for scalable quantum systems, yet current approaches require the signer to initiate communication, creating unnecessary overhead.

source: arXiv · relevance score: 48</description><pubDate>Fri, 05 Dec 2025 04:40:34 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[36] SDQC: Distributed Quantum Computing Architecture Utilizing Entangled Ion Qubit Shuttling</title><link>https://arxiv.org/abs/2512.02890v1</link><guid isPermaLink="true">https://arxiv.org/abs/2512.02890v1</guid><description>We propose Shuttling-based Distributed Quantum Computing (SDQC), a hybrid architecture that combines the strengths of physical qubit shuttling and distributed quantum computing to enable scalable trapped-ion quantum computing.

source: arXiv · relevance score: 36</description><pubDate>Tue, 02 Dec 2025 15:56:25 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[30] Shor&apos;s algorithm: the one quantum algo that ends RSA/ECC tomorrow</title><link>https://blog.ellipticc.com/posts/what-is-shors-algorithm-and-why-its-the-single-biggest-threat-to-classical-cryptography/</link><guid isPermaLink="true">https://blog.ellipticc.com/posts/what-is-shors-algorithm-and-why-its-the-single-biggest-threat-to-classical-cryptography/</guid><description>Shor&apos;s algorithm: the one quantum algo that ends RSA/ECC tomorrow

source: Hacker News · relevance score: 30</description><pubDate>Fri, 28 Nov 2025 03:19:51 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[39] Quantum computers will not steal your bitcoins, even if they can</title><link>https://bfswa.substack.com/p/quantum-computers-will-not-steal</link><guid isPermaLink="true">https://bfswa.substack.com/p/quantum-computers-will-not-steal</guid><description>Quantum computers will not steal your bitcoins, even if they can

source: Hacker News · relevance score: 39</description><pubDate>Wed, 26 Nov 2025 13:31:15 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[100] Resource analysis of Shor&apos;s elliptic curve algorithm with an improved quantum adder on a two-dimensional lattice</title><link>https://arxiv.org/abs/2510.23212v1</link><guid isPermaLink="true">https://arxiv.org/abs/2510.23212v1</guid><description>Quantum computers have the potential to break classical cryptographic systems by efficiently solving problems such as the elliptic curve discrete logarithm problem using Shor&apos;s algorithm.

source: arXiv · relevance score: 100</description><pubDate>Mon, 27 Oct 2025 11:02:10 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[39] Federal Reserve Warns Quantum Computers Could Expose Bitcoin&apos;s Hidden Past</title><link>https://thequantuminsider.com/2025/10/06/federal-reserve-warns-quantum-computers-could-expose-bitcoins-hidden-past/</link><guid isPermaLink="true">https://thequantuminsider.com/2025/10/06/federal-reserve-warns-quantum-computers-could-expose-bitcoins-hidden-past/</guid><description>Federal Reserve Warns Quantum Computers Could Expose Bitcoin&apos;s Hidden Past

source: Hacker News · relevance score: 39</description><pubDate>Wed, 08 Oct 2025 11:14:29 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[34] Quantum and Classical Machine Learning in Decentralized Finance: Comparative Evidence from Multi-Asset Backtesting of Automated Market Makers</title><link>https://arxiv.org/abs/2510.15903v1</link><guid isPermaLink="true">https://arxiv.org/abs/2510.15903v1</guid><description>This study presents a comprehensive empirical comparison between quantum machine learning (QML) and classical machine learning (CML) approaches in Automated Market Makers (AMM) and Decentralized Finance (DeFi) trading strategies through ext

source: arXiv · relevance score: 34</description><pubDate>Sun, 14 Sep 2025 01:52:57 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] Quantum Leap in Finance: Economic Advantages, Security, and Post-Quantum Readiness</title><link>https://arxiv.org/abs/2508.21548v1</link><guid isPermaLink="true">https://arxiv.org/abs/2508.21548v1</guid><description>This paper provides an in-depth review of the evolving role of quantum computing in the financial sector, emphasizing both its computational potential and cybersecurity implications.

source: arXiv · relevance score: 100</description><pubDate>Fri, 29 Aug 2025 12:04:08 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] Brace for impact: ECDLP challenges for quantum cryptanalysis</title><link>https://arxiv.org/abs/2508.14011v2</link><guid isPermaLink="true">https://arxiv.org/abs/2508.14011v2</guid><description>Precise suites of benchmarks are required to assess the progress of early fault-tolerant quantum computers at economically impactful applications such as cryptanalysis.

source: arXiv · relevance score: 100</description><pubDate>Tue, 19 Aug 2025 17:16:31 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[100] NIST Post-Quantum Cryptography Standard Algorithms Based on Quantum Random Number Generators</title><link>https://arxiv.org/abs/2507.21151v1</link><guid isPermaLink="true">https://arxiv.org/abs/2507.21151v1</guid><description>In recent years, the advancement of quantum computing technology has posed potential security threats to RSA cryptography and elliptic curve cryptography.

source: arXiv · relevance score: 100</description><pubDate>Thu, 24 Jul 2025 00:27:23 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[50] How could ECDSA be broken through Shor&apos;s Algorithm? (2023)</title><link>https://crypto.stackexchange.com/questions/103657/how-could-ecdsa-be-broken-with-prime-factorization-through-shors-algorithm</link><guid isPermaLink="true">https://crypto.stackexchange.com/questions/103657/how-could-ecdsa-be-broken-with-prime-factorization-through-shors-algorithm</guid><description>How could ECDSA be broken through Shor&apos;s Algorithm? (2023)

source: Hacker News · relevance score: 50</description><pubDate>Mon, 21 Jul 2025 20:08:58 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[61] Time Entangled Quantum Blockchain with Phase Encoding for Classical Data</title><link>https://arxiv.org/abs/2507.14839v3</link><guid isPermaLink="true">https://arxiv.org/abs/2507.14839v3</guid><description>With rapid advancements in quantum computing, it is widely believed that there will be quantum hardware capable of compromising classical cryptography and hence, the internet and the current information security infrastructure in the coming

source: arXiv · relevance score: 61</description><pubDate>Sun, 20 Jul 2025 06:50:41 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[54] OSI Stack Redesign for Quantum Networks: Requirements, Technologies, Challenges, and Future Directions</title><link>https://arxiv.org/abs/2506.12195v1</link><guid isPermaLink="true">https://arxiv.org/abs/2506.12195v1</guid><description>Quantum communication is poised to become a foundational element of next-generation networking, offering transformative capabilities in security, entanglement-based connectivity, and computational offloading.

source: arXiv · relevance score: 54</description><pubDate>Fri, 13 Jun 2025 19:48:18 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[36] Validation of Quantum Elliptic Curve Point Addition Circuits</title><link>https://arxiv.org/abs/2506.03318v2</link><guid isPermaLink="true">https://arxiv.org/abs/2506.03318v2</guid><description>Specific quantum algorithms exist to-in theory-break elliptic curve cryptographic protocols. Implementing these algorithms requires designing quantum circuits that perform elliptic curve arithmetic.

source: arXiv · relevance score: 36</description><pubDate>Tue, 03 Jun 2025 19:06:18 GMT</pubDate><category>feed</category><category>arxiv</category></item><item><title>[30] Shor&apos;s Algorithm</title><link>https://en.wikipedia.org/wiki/Shor%27s_algorithm</link><guid isPermaLink="true">https://en.wikipedia.org/wiki/Shor%27s_algorithm</guid><description>Shor&apos;s Algorithm

source: Hacker News · relevance score: 30</description><pubDate>Mon, 02 Jun 2025 16:17:28 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[35] BIP-360: QuBit – Pay to Quantum Resistant Hash</title><link>https://github.com/bitcoin/bips/pull/1670</link><guid isPermaLink="true">https://github.com/bitcoin/bips/pull/1670</guid><description>BIP-360: QuBit – Pay to Quantum Resistant Hash

source: Hacker News · relevance score: 35</description><pubDate>Wed, 12 Mar 2025 06:03:42 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[35] I launched q-day.org, the place to discuss about the quantum threat</title><link>https://q-day.org/</link><guid isPermaLink="true">https://q-day.org/</guid><description>I launched q-day.org, the place to discuss about the quantum threat

source: Hacker News · relevance score: 35</description><pubDate>Thu, 18 May 2023 20:14:38 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[30] Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Ecdlp</title><link>https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2292844/</link><guid isPermaLink="true">https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2292844/</guid><description>Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Ecdlp

source: Hacker News · relevance score: 30</description><pubDate>Wed, 27 Jan 2021 01:30:41 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[100] Projects Post-Quantum Cryptography PQC Share to Facebook Share to X Share to LinkedIn Share ia Email Project Links Overview FAQs News &amp; Updates Events Publications Presentations Ov</title><link>https://csrc.nist.gov/projects</link><guid isPermaLink="true">https://csrc.nist.gov/projects</guid><description>Projects Post-Quantum Cryptography PQC Share to Facebook Share to X Share to LinkedIn Share ia Email Project Links Overview FAQs News &amp; Updates Events Publications Presentations Overview Short URL: https://www.nist.gov/pqcrypto For a plain-

source: NIST PQC · relevance score: 100</description><pubDate>Tue, 03 Jan 2017 00:00:00 GMT</pubDate><category>feed</category><category>nist-pqc</category></item><item><title>[30] New ECDLP record</title><link>https://ellipticnews.wordpress.com/2016/11/30/new-ecdlp-record/</link><guid isPermaLink="true">https://ellipticnews.wordpress.com/2016/11/30/new-ecdlp-record/</guid><description>New ECDLP record

source: Hacker News · relevance score: 30</description><pubDate>Wed, 30 Nov 2016 18:42:54 GMT</pubDate><category>feed</category><category>hacker-news</category></item><item><title>[30] ECDLP Can Be Solved in 24-th Root Time</title><link>https://ellipticnews.wordpress.com/2016/03/31/ecdlp-can-be-solved-in-24-th-root-time/</link><guid isPermaLink="true">https://ellipticnews.wordpress.com/2016/03/31/ecdlp-can-be-solved-in-24-th-root-time/</guid><description>ECDLP Can Be Solved in 24-th Root Time

source: Hacker News · relevance score: 30</description><pubDate>Fri, 01 Apr 2016 06:55:49 GMT</pubDate><category>feed</category><category>hacker-news</category></item></channel></rss>