<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Encryptorium</title><description>Post-quantum cryptography education and research</description><link>https://encryptorium.com/</link><language>en</language><item><title>Quantum-safe Bitcoin transactions without a soft fork: what the QSB paper actually says</title><link>https://encryptorium.com/blog/quantum-safe-bitcoin-qsb/</link><guid isPermaLink="true">https://encryptorium.com/blog/quantum-safe-bitcoin-qsb/</guid><description>StarkWare&apos;s QSB paper shows a quantum-safe way to spend legacy Bitcoin outputs with no soft fork. Here are the honest numbers and the five things it still cannot fix.</description><pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate><category>PQC</category><category>Bitcoin</category><category>Post-Quantum</category><category>Quantum Computing</category><category>Hash-Based Signatures</category></item><item><title>PQC Migration Plans Have a ZK Blind Spot</title><link>https://encryptorium.com/blog/pqc-zk-blind-spot/</link><guid isPermaLink="true">https://encryptorium.com/blog/pqc-zk-blind-spot/</guid><description>Major PQC migration documents from NIST, NCSC, and the EU omit zero-knowledge verification infrastructure. That gap leaves deployed ZK stacks unaccounted for.</description><pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate><category>PQC</category><category>Zero-Knowledge</category><category>ZK Rollups</category><category>Post-Quantum</category><category>Migration</category></item><item><title>Google&apos;s quantum threat to Bitcoin: what the paper actually says</title><link>https://encryptorium.com/blog/google-quantum-threat-bitcoin/</link><guid isPermaLink="true">https://encryptorium.com/blog/google-quantum-threat-bitcoin/</guid><description>A new Google Quantum AI paper shows that breaking Bitcoin&apos;s elliptic curve signatures could require fewer than 500,000 physical qubits, roughly a 20x reduction from prior estimates. The result is real. The panic is not.</description><pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate><category>PQC</category><category>quantum-computing</category><category>bitcoin</category><category>cryptography</category></item><item><title>Why organizations need a cryptographic bill of materials for PQC migration</title><link>https://encryptorium.com/blog/cbom-cryptographic-inventory/</link><guid isPermaLink="true">https://encryptorium.com/blog/cbom-cryptographic-inventory/</guid><description>You cannot migrate what you cannot see. CycloneDX&apos;s CBOM capability provides the foundation for post-quantum migration planning, starting with an inventory of every algorithm, key, and certificate.</description><pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate><category>PQC</category><category>CBOM</category><category>CycloneDX</category><category>migration</category><category>NIST</category></item><item><title>PQ/T hybrid schemes: bridging traditional and post-quantum cryptography</title><link>https://encryptorium.com/blog/pqc-hybrid-schemes/</link><guid isPermaLink="true">https://encryptorium.com/blog/pqc-hybrid-schemes/</guid><description>PQ/T hybrid schemes combine traditional and post-quantum algorithms to manage migration risk. When to use them, the overhead, and why they are an interim step.</description><pubDate>Sun, 22 Mar 2026 00:00:00 GMT</pubDate><category>Standards &amp; Policy</category><category>hybrid-schemes</category><category>tls</category><category>migration</category><category>ncsc</category><category>ietf</category></item><item><title>ML-KEM explained: NIST&apos;s new standard for post-quantum key establishment</title><link>https://encryptorium.com/blog/ml-kem-explained/</link><guid isPermaLink="true">https://encryptorium.com/blog/ml-kem-explained/</guid><description>ML-KEM (FIPS 203) is NIST&apos;s standard KEM for post-quantum key establishment. This post covers the MLWE hardness assumption, parameter set tradeoffs, and TLS 1.3 hybrid deployment.</description><pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate><category>PQC</category><category>ml-kem</category><category>fips-203</category><category>lattice-based</category><category>key-establishment</category><category>nist</category></item><item><title>Post-quantum cryptography: what it is and why migration starts now</title><link>https://encryptorium.com/blog/understanding-post-quantum-cryptography/</link><guid isPermaLink="true">https://encryptorium.com/blog/understanding-post-quantum-cryptography/</guid><description>An introduction to post-quantum cryptography: what it is, why today&apos;s public-key cryptography is at risk, and what NIST&apos;s new standards mean for secure communication.</description><pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate><category>PQC</category><category>NIST</category><category>ml-kem</category><category>ml-dsa</category><category>introduction</category></item><item><title>Post-quantum ZK is an architecture problem</title><link>https://encryptorium.com/blog/pq-zk-architecture-problem/</link><guid isPermaLink="true">https://encryptorium.com/blog/pq-zk-architecture-problem/</guid><description>Post-quantum migration for ZK proof systems is an architecture problem, not a parameter-tuning problem. A four-layer framework for analyzing where quantum-vulnerable assumptions sit in a proving stack, applied to Zcash, ZKsync Era, and Starknet.</description><pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate><category>PQC</category><category>zero-knowledge</category><category>architecture</category><category>post-quantum</category></item><item><title>Crypto agility: designing systems that survive broken cryptography</title><link>https://encryptorium.com/blog/crypto-agility/</link><guid isPermaLink="true">https://encryptorium.com/blog/crypto-agility/</guid><description>Crypto agility is the ability to swap cryptographic primitives without redesigning systems. What it requires in practice, and why the PQC transition demands it.</description><pubDate>Sun, 15 Feb 2026 00:00:00 GMT</pubDate><category>PQC</category><category>cryptography</category><category>migration</category></item></channel></rss>