Resource Center
Blogs
Tech Research
When in ROM, do as the quantum attackers do: Part I
This blogpost serves as a gentle introduction to a widely used security model for analyzing real-world post-quantum cryptosystems, including the recent NIST standards, called the "quantum random oracle model".
|
November 4, 2025

This blogpost serves as a gentle introduction to a widely used security model for analyzing real-world post-quantum cryptosystems, including the recent NIST standards, called the "quantum random oracle model".
Check out the full article: https://cryptographycaffe.sandboxaq.com/posts/qrom-intro/

