TWO PAGERS
DESIGNS & ARCHITECTURES
LATEST ARTICLES
In the current era of cybersecurity, we are locked in a race against the clock. Most encryption methods we rely on today are computationally secure, meaning they are essentially math...
Firmware Over-the-Air (FOTA) is the essential mechanism for maintaining, securing, and improving billions of connected devices, from modern automobiles to critical infrastructure sensors....
While the industry has long favored Elliptic Curve Cryptography (ECC) for its agility, that very efficiency now acts as a bullseye for Shor’s Algorithm. Because ECC requires significantly...
For decades, the cryptographic foundations of the modern enterprise have been treated as "set it and forget it" infrastructure, poured like concrete and rarely revisited. However, as...
Think of Hybrid Post-Quantum Cryptography (PQC) not as a translator between old and new systems, but as a double-locked vault. Currently, our digital world relies on "Classic" locks...
A compromised private cryptography key destroys the core security it protects: attackers can impersonate the key owner, decrypt sensitive data, forge signatures, and gain unauthorized...
What if the quantum era starts with a whisper, not a bang? A compromised network, an "impossible" decryption—is the silent singularity already here? Are your keys actually safe?
The security of the modern internet rests upon a mathematical "trapdoor" that is easy to enter but nearly impossible to exit without the right key. This trapdoor is the core of the...
LangChain is a powerful framework for building applications powered by Large Language Models (LLMs). It simplifies the process of connecting LLMs with various data sources and tools...
Quantum teleportation is a real process in quantum physics that allows the state of a particle (like an electron or photon) to be transferred from one place to another — without physically...
In the last post, I explained about matrix operations, the eigen vectors, the operator matrix, etc. We also went through the basic single qubit gates, like the Pauli X gate, Hadamard...
My next few posts will be about quantum computing, (not the Iran’s version where they portrayed a ZedBoard Zynq-7000 as a quantum processor).We will code on IBM Qiskit libraries....











