«to Polynom

Blogs & Announcements

  • Quantum State Transfer Protocols: A Giant Leap Forward?

    Jeff Phillips  |  5 Min Read

    The latest big development in quantum computing is the ability to directly transfer quantum bits (qubits) between quantum computer microchip modules. This was demonstrated by researchers from the ...



    Continue Reading »
  • Quantum Computing & Threat to Existing Cryptography

    Jeff Phillips  |  5 Min Read

    Quantum computing is an exponentially advancing field of computer science that exploits the principles of quantum mechanics to perform computations that are intractable on classical computers ...



    Continue Reading »
  • Improvements in Quantum Computing Error Correction

    Jeff Phillips  |  5 Min Read

    There has been significant progress in developing QEC techniques in recent years. These techniques allow quantum computers to correct errors and remain accurate even with significant noise ...



    Continue Reading »
  • AES: One of the Most Secure Algorithms in Existence

    Jeff Phillips  |  10 Min Read

    The Advanced Encryption Standard (AES) is a widely adopted encryption algorithm crucial in securing digital communications, sensitive data, and information systems ...



    Continue Reading »
  • Quantum Computing & Threat to Existing Cryptography

    Jeff Phillips  |  5 Min Read

    Quantum computing is an exponentially advancing field of computer science that exploits the principles of quantum mechanics to perform computations that are intractable on classical computers ...



    Continue Reading »
  • Lattice-Based Cryptography: A PQC Solution

    Jeff Phillips  |  5 Min Read

    Lattice-based cryptography is a type of cryptography that is designed to be secure even against quantum computers. Lattice-based cryptography uses the difficulty of solving certain problems on lattices ...



    Continue Reading »
  • What's Up with WhatsApp? – Most Used VoIP Security Critique

    Jeff Phillips  |  15 Min Read

    WhatsApp is the world's largest VoIP app. As of August 2023, it had over 2.74 billion active users worldwide[1]. It is used by people in over 180 ...



    Continue Reading »
  • An Overview of Signal and Its Critical Vulnerabilities

    Jeff Phillips  |  10 Min Read

    Signal is a popular messaging app often touted as a secure, end-to-end encrypted platform created by respected cryptographer Moxie Marlinspike...



    Continue Reading »
  • Credential Theft in Collaboration Applications

    Jeff Phillips  |  5 Min Read

    Collaboration applications (i.e., Zoom, Microsoft Teams, Slack, Discord, etc.) have become essential tools for businesses of all sizes. These apps allow teams to communicate and collaborate ...



    Continue Reading »
  • PolynomTM: New PQC Security Standard in Virtual Data Rooms

    Jeff Phillips  |  5 Min Read

    For many years, virtual data rooms (VDRs) have been the standard for sharing confidential documents on a secure online platform. Traditional data rooms and VDRs allow sellers or ...



    Continue Reading »
  • Self-Hosting Hardware: Intel NUC 13 Pro & Desktop Editions

    Jeff Phillips  |  5 Min Read

    Recently, there has been a growing trend of individuals and small businesses self-hosting their data services. This is due to several factors, including the increasing affordability of hardware, the growing ...



    Continue Reading »
  • Collaboration for Freedom - iVOL & Code Siren, LLC Initiative

    Jeff Phillips   |   5 Min Read

    The Institute for Voices of Liberty and Code Siren, LLC to Provide Free Secure Communications to the Freedom-Seeking People of Iran ...



    Continue Reading »
  • Polynom Security Whitepaper - v1.93

    Jeff Phillips   |   120 Min Read

    Learn more about what's in store for the coming months, years, and decades. Our team is committed to delivering ...



    Read the Whitepaper »
  • PolynomTM: New PQC Security Standard in Virtual Data Rooms

    Jeff Phillips  |  5 Min Read

    For many years, virtual data rooms (VDRs) have been the standard for sharing confidential documents on a secure online platform. Traditional data rooms and VDRs allow sellers or ...



    Continue Reading »