Quantum Technologies Globe

National Initiatives in Quantum Technologies (as of April 2022)

Quantum Technologies United States National Quantum Initiative Act…


Glossary Quantum Computing Cybersecurity

Glossary of Quantum Computing Terms

Fundamentals of Quantum Computing Qubit Superposition Entanglement Quantum…


Telecommunications 5G Cryptography Quantum

Cryptography in a Modern 5G Call: A Step-by-Step Breakdown

Introduction 1. Subscriber Identity and Authentication 2. Radio Access…


Explainable AI Framework

Explainable AI Frameworks

Introduction Explainable AI Frameworks LIME (Local Interpretable…


Meta Attacks

Meta-Attacks: Utilizing Machine Learning to Compromise Machine Learning Systems

What is Machine Learning? Basic Types of Attacks on Machine Learning…


AI Saliency Attacks

How Saliency Attacks Quietly Trick Your AI Models

The Basics of AI and Model Vulnerability What are Saliency Attacks?…


Ready for Quantum

Ready for Quantum: Practical Steps for Cybersecurity Teams

1. Introduction 2. Practical Reasons for Preparing Now 2.1. The…


Next-Gen QKD

Next-Generation QKD Protocols: A Cybersecurity Perspective

Introduction to QKD and Its Importance for Cybersecurity Overview of…


Batch Exploration Attacks

Batch Exploration Attacks on Streamed Data Models

Introduction What are Streamed Data Models? What is Batch Exploration…


Tokenization Quantum

Evaluating Tokenization in the Context of Quantum Readiness

Introduction What is Tokenization? The Benefits of Tokenization in the…


Privacy Preference Center