Resource Center
Blogs
Tech Research

When in ROM, do as the quantum attackers do: Part I

This blogpost serves as a gentle introduction to a widely used security model for analyzing real-world post-quantum cryptosystems, including the recent NIST standards, called the "quantum random oracle model".

Varun Maram
|
November 4, 2025

This blogpost serves as a gentle introduction to a widely used security model for analyzing real-world post-quantum cryptosystems, including the recent NIST standards, called the "quantum random oracle model".

Check out the full article: https://cryptographycaffe.sandboxaq.com/posts/qrom-intro/

Share
Monthly dispatches on the age of Cybersecurity. Delivered to your inbox.
Thank you! Your submission has been received.
Something went wrong. Please try again later.