ISARA Insights Blog

Featured Blog Post

The ABCs of Harvest and Decrypt

Philip Lafrance
Feb 24, 2025

As large-scale quantum computing inches ever closer, the urgency to protect our digital assets now from future threats is growing. Around the world, organizations of all kinds are being strongly encouraged to start preparing for quantum-capable adversaries. And for several very good reasons. If you’re familiar with the quantum-threat to cryptography, you’ve likely heard that current encryption algorithms are vulnerable to quantum computing attacks. You may have come across discussions about post-quantum cryptography standards. And perhaps you’ve heard that today’s encrypted data could be at risk from tomorrow’s quantum-enabled attackers.

Read more

Tags:

5 Ways Quantum Computing Will Change the World

Martin Laforest
Apr 17, 2019

In the days after I resigned from my position as the senior manager of scientific outreach at the Institute for Quantum Computing to join ISARA Corporation, one esteemed colleague after another would offer…

Read more


Quantum Key Distribution and Quantum-Safe Cryptography: two (complementary) approaches to becoming quantum-ready

Martin Laforest
Nov 29, 2018

Every advancement in quantum computing brings us closer to the positive and negative disruptions this revolutionary technology promises. Though a large-scale quantum computer is not here yet, its future…

Read more