Skip to content
Quantum Zeitgeist
  • Quantum Computing
    • Quantum Computing News
    • Quantum Research News
    • Quantum Computing Business News
    • Quantum Algorithms
    • Quantum Physics
    • Quantum Hardware
    • Quantum Applications
    • Quantum Security
    • Quantum Sensors
    • Quantum Machine Learning
    • Quantum Funding Landscape
    • Quantum Internet
    • Quantum Features
    • Quantum Programming
    • Quantum Cryptography
    • Quantum Companies
    • Quantum Cloud
  • Technology News
    • Physics
    • Artificial Intelligence
    • Metaverse
    • Machine Learning
    • Robotics
    • Technology Features
  • Quantum Navigator

Category: Quantum Security

  • Quantum Computer Threats to Cryptography Mitigated by Hybrid Quantum Key Exchange
    Quantum Security

    Quantum Computer Threats to Cryptography Mitigated by Hybrid Quantum Key Exchange

    by Dr. DonovanFebruary 12, 2024
  • Chinese Improve Revolutionize Quantum Digital Signatures, Boosting Security and Efficiency
    Quantum Security

    Chinese Improve Revolutionize Quantum Digital Signatures, Boosting Security and Efficiency

    by Dr. DonovanFebruary 10, 2024
  • Crosstalk Attacks Threaten Quantum Computing Security, Australian Researchers Develop Mitigation Strategies
    Quantum Security

    Crosstalk Attacks Threaten Quantum Computing Security, Australian Researchers Develop Mitigation Strategies

    by Dr. DonovanFebruary 9, 2024
  • University of Luxembourg Researchers Enhance Quantum Key Distribution Security with Risk-Aware Machine Learning
    Quantum Security

    University of Luxembourg Researchers Enhance Quantum Key Distribution Security with Risk-Aware Machine Learning

    by Dr. DonovanFebruary 8, 2024
  • Linux Foundation Launches Alliance to Advance Post-Quantum Cryptography Security
    Quantum Security

    Linux Foundation Launches Alliance to Advance Post-Quantum Cryptography Security

    by Dr. DonovanFebruary 8, 2024
  • Quantum Dice and BT Group Test Quantum Random Number Generators for Enhanced Telecom Security
    Quantum Applications, Quantum Security

    Quantum Dice and BT Group Test Quantum Random Number Generators for Enhanced Telecom Security

    by Dr. DonovanFebruary 6, 2024
  • Quantum Computing Poses Threat to Cryptography, Urgent Shift to Quantum-Resistant Systems Needed
    Quantum Security

    Quantum Computing Poses Threat to Cryptography, Urgent Shift to Quantum-Resistant Systems Needed

    by Dr. DonovanFebruary 2, 2024
  • Post-Quantum Cryptography Enhances Vehicle Security, Counters Quantum Computing Threats
    Quantum Security

    Post-Quantum Cryptography Enhances Vehicle Security, Counters Quantum Computing Threats

    by The Quantum MechanicFebruary 2, 2024
  • Quantum Key Distribution Security Boosted by Novel Algorithm, Reducing Memory Footprint by 25%
    Quantum Security

    Quantum Key Distribution Security Boosted by Novel Algorithm, Reducing Memory Footprint by 25%

    by Dr. DonovanJanuary 30, 2024
  • Researchers Advance Quantum Cryptography with Controlled Photon Number Coherence in Quantum Dots
    Quantum Cryptography, Quantum Security

    Researchers Advance Quantum Cryptography with Controlled Photon Number Coherence in Quantum Dots

    by Dr. DonovanJanuary 29, 2024
  • Qrypt and University of Texas Secure Air Force Contract to Combat Quantum Threats
    Quantum Security

    Qrypt and University of Texas Secure Air Force Contract to Combat Quantum Threats

    by Paul JamesJanuary 27, 2024
  • Quantum Cryptography and Holography: New Insights into Hamiltonian Simulation Limits
    Quantum Research News, Quantum Security

    Quantum Cryptography and Holography: New Insights into Hamiltonian Simulation Limits

    by Dr. DonovanJanuary 25, 2024
  • Quantum-Resistant FALCON Algorithm Challenges Cryptography, Promises Secure IoT Future
    Quantum Cryptography, Quantum Security

    Quantum-Resistant FALCON Algorithm Challenges Cryptography, Promises Secure IoT Future

    by Dr. DonovanJanuary 25, 2024
  • Quantum Computing Threatens Cybersecurity: Critical Infrastructure at Risk, Post-Quantum Solutions Needed According to Spanish Scientists
    Quantum Security

    Quantum Computing Threatens Cybersecurity: Critical Infrastructure at Risk, Post-Quantum Solutions Needed According to Spanish Scientists

    by Dr. DonovanJanuary 22, 2024
  • Are we at the start of Quantum E-commerce? Could the Quantum Internet mitigate online security risks with a demonstration of 1-second Quantum transactions? A new publication and research might usher in a new era?
    Quantum Features, Quantum Security, Technology News

    Are we at the dawn of Quantum E-commerce? Could the Quantum Internet mitigate online security risks with a demonstration of 1-second Quantum transactions?

    by The Quantum MechanicJanuary 15, 2024
  • Classical Encryption's Quantum Threat: A Growing Concern
    Quantum Security

    Classical Encryption’s Quantum Threat: A Growing Concern

    by Dr. DonovanJanuary 13, 2024
  • Qrypt Joins NVIDIA Inception to Fortify AI Data Security with Quantum-Secure Encryption
    Quantum Computing Business News, Quantum Security

    Qrypt Joins NVIDIA Inception to Fortify AI Data Security with Quantum-Secure Encryption

    by The Quantum MechanicJanuary 11, 2024
  • 2024 Dubai World Trade Centre (DWTC) to Feature Quantum Technologies
    Quantum Security

    2024 Dubai World Trade Centre (DWTC) to Feature Quantum Technologies

    by Quantum StrategistJanuary 5, 2024
  • QuSecure's QuProtect: Post-Quantum Cryptography Software Now Available on AWS Marketplace
    Quantum Security

    QuSecure’s QuProtect: Post-Quantum Cryptography Software Now Available on AWS Marketplace

    by The Quantum MechanicDecember 22, 2023
  • QuSecure's QuProtect Crowned 2023's Best Quantum Cyber Security Solution by ASTORS Awards
    Quantum Security

    QuSecure’s QuProtect Crowned 2023’s Best Quantum Cyber Security Solution by ASTORS Awards

    by Paul JamesDecember 11, 2023
  • Qrypt and LANL Achieve Quantum Breakthrough for Enhanced Cryptographic Security with QRNG
    Quantum Security, Technology News

    Qrypt and LANL Achieve Quantum Breakthrough for Enhanced Cryptographic Security with QRNG

    by Quantum EvangelistDecember 11, 2023
  • China Telecom Unveils Huawei Mate 60 Pro with Quantum Security
    Quantum Security

    China Telecom Unveils Huawei Mate 60 Pro with Quantum Security

    by The Quantum MechanicNovember 15, 2023
  • evolutionQ Partners with Bank of Canada for Quantum-Safe Digital Currency Research
    Quantum Security

    evolutionQ Partners with Bank of Canada for Quantum-Safe Digital Currency Research

    by SchrödingerSeptember 6, 2023
  • ISO gets Quantum with QKD protocol
    Quantum Security

    ISO gets Quantum with QKD protocol

    by The QuantAugust 30, 2023
  • Quantum Inspired MemComputing says RSA 2048 can be broken in real-time
    Quantum Security

    Quantum Inspired MemComputing says RSA 2048 can be broken in real-time

    by Paul JamesAugust 29, 2023
  • Denmark Invests One Billion Kroner ($146m) in Quantum Tech for Cybersecurity and Innovation
    Quantum Funding, Quantum Security

    Denmark Invests One Billion Kroner ($146m) in Quantum Tech for Cybersecurity and Innovation

    by Quantum EvangelistJune 19, 2023
  • Quantinuum Launches Quantum Origin Onboard for Device-Level Quantum-Computing-Hardened Encryption
    Quantum Security, Technology News

    Quantinuum Launches Quantum Origin Onboard for Device-Level Quantum-Computing-Hardened Encryption

    by Paul JamesJune 16, 2023
  • ETSI Unveils Quantum Key Distribution Protection Profile (PP)
    Quantum Cryptography, Quantum Security

    ETSI Unveils Quantum Key Distribution Protection Profile (PP)

    by Kyrlynn DMay 4, 2023
  • Revolutionizing Quantum-Secure Encryption: The Role of Cloud Technology in Making Quantum Random Numbers Accessible.
    Quantum Random Number Generator, Quantum Security

    Revolutionizing Quantum-Secure Encryption: The Role of Cloud Technology in Making Quantum Random Numbers Accessible.

    by Kyrlynn DApril 7, 2023
  • Quantum Japan
    Quantum Cryptography, Quantum Security

    Cybertrust Japan now includes Quantum Origin Quantum-Computing-Hardened Private Keys to the IoT Authentication Platform.

    by Kyrlynn DFebruary 2, 2023
  • Secure communications by Quantum Technology
    Quantum Security

    iQuila and Quantum Dice collaborate to provide unrivalled encryption security over remote network connections.

    by Kyrlynn DJanuary 13, 2023
  • Post-Quantum Cybersecurity (PQC) Solution  by QuSecure receives the 2022 CyberSecured Award for Quantum Computing
    Quantum Research News, Quantum Security

    Post-Quantum Cybersecurity (PQC) Solution  by QuSecure receives the 2022 CyberSecured Award for Quantum Computing

    by Kyrlynn DJanuary 13, 2023
  • Do we need to worry about China breaking RSA encryption technologies with quantum computers?
    Quantum Security

    Do we need to worry about China breaking RSA encryption technologies with Quantum Computers?

    by Rusty FlintJanuary 8, 2023
  • Biden Passes Quantum Computing Cybersecurity Bill Into Law
    Quantum Security

    Biden Passes Quantum Computing Cybersecurity Bill Into Law

    by Inemesit EtimDecember 28, 2022
  • Quantum Security on main frame
    Quantum Security

    IBM Beefs up Security Of Its Z Series Against Quantum Threats

    by Inemesit EtimOctober 19, 2022
  • LG Post Quantum Cryptography
    Quantum Security

    LG To Introduce Post-Quantum Cryptography To Vehicles in the quest for enhanced security

    by Inemesit EtimOctober 12, 2022
  • PQShield Announces A Post-Quantum Upgrade For Signal Protocol 
    Quantum Security

    PQShield Announces A Post-Quantum Upgrade For Signal Protocol 

    by Inemesit EtimSeptember 15, 2022
  • New app allows quantum generated passwords enabling a more secure online experience
    Quantum Applications, Quantum Security

    New app allows quantum generated passwords enabling a more secure online experience

    by Rusty FlintAugust 17, 2022
  • Quantum Security takes a leap forward with integration into popular protocol OpenSSH
    Quantum Security

    Quantum Security takes a leap forward with integration into popular protocol OpenSSH

    by Quantum StrategistApril 11, 2022

Posts navigation

Newer posts
Quantum Computing News
Bluesky Logo

Quantum Computing

  • Quantum Applications
  • Quantum Books
  • Quantum Computing Courses
  • Quantum Machine Learning
  • Quantum Programming

Quantum Computing

  • Quantum Cloud
  • Quantum Landscape
  • Quantum Cryptography
  • Quantum Finance
  • Quantum Hardware
  • Quantum Internet
  • Quantum Investment

Technology

  • Artificial Intelligence
  • Analog Computing
  • Deep Tech
  • Emerging Technology
  • High Performance Computing
  • Machine Learning
  • Space
  • Science
  • Robotics

About Us

  • About Us
  • Write for Us
  • Terms and Conditions
  • Privacy Policy
  • Contact Us

Disclaimer: All material, including information from or attributed to Quantum Zeitgeist or individual authors of content on this website, has been obtained from sources believed to be accurate as of the date of publication. However, Quantum Zeitgeist makes no warranty of the accuracy or completeness of the information and Quantum Zeitgeist does not assume any responsibility for its accuracy, efficacy, or use. Any information on the website obtained by Quantum Zeitgeist from third parties has not been reviewed for accuracy.

Copyright 2019 to 2026 The Quantum Zeitgeist website is owned and operated by Hadamard LLC, a Wyoming limited liability company.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}