Marin’s Q-Day Prediction Countdown:

Here is my personal Q-Day prediction. For an understanding of the factors I am considering and recent events that are influencing this prediction, please see Marin’s Q-Day Prediction page.

Most Popular Articles This Week

    January 1, 2024

    Marin’s Statement on AI Risks

    The rapid development of AI brings both extraordinary potential and unprecedented risks. AI systems are increasingly demonstrating emergent behaviors, and…
    November 1, 2021

    Ready for Quantum: Practical Steps for Cybersecurity Teams

    The journey towards quantum resistance is not merely about staying ahead of a theoretical threat but about evolving our cybersecurity…
    July 27, 2023

    Q-Day Predictions: Anticipating the Arrival of CRQC

    While CRQCs capable of breaking current public key encryption algorithms have not yet materialized, technological advancements are pushing us towards…
    March 8, 2023

    Quantum Networks 101: An Intro for Cyber Professionals

    Quantum networks are on the cusp of transitioning from theory to practice, following a trajectory not unlike the early development…
    November 1, 2023

    Taxonomy of Quantum Computing: Paradigms & Architectures

    Over the past few decades, researchers have devised multiple quantum computing paradigms – different models and physical implementations of quantum…
    August 23, 2024

    Full Stack of AI Concerns: Responsible, Safe, Secure AI

    As AI continues to evolve and integrate deeper into societal frameworks, the strategies for its governance, alignment, and security must…
    No posts found.

    Shor’s Algorithm: A Quantum Threat to Modern Cryptography

    Shor’s Algorithm is more than just a theoretical curiosity – it’s a wake-up call for the security community. By understanding its principles and implications, we can appreciate why the cryptographic landscape must evolve. The goal of this guide is to equip you with that understanding, without delving into complex mathematics, ... Read More

    Grover’s Algorithm and Its Impact on Cybersecurity

    Grover’s algorithm was one of the first demonstrations of quantum advantage on a general problem. It highlighted how quantum phenomena like superposition and interference can be harnessed to outperform classical brute force search. Grover’s is often described as looking for “a needle in a haystack” using quantum mechanics ... Read More

    Quantum-Safe vs. Quantum-Secure Cryptography

    In 2010, I was serving as an interim CISO for an investment bank. During that time, I was already trying to figure out the risks posed by quantum computing. One day, I was approached by a vendor who, with great confidence, made two bold claims. First, they insisted that the ... Read More

    Key Principles and Theorems in Quantum Computing and Networks

    The landscape of quantum computing and quantum networks is an exciting frontier where physics and cybersecurity intersect. We’re witnessing the early days of this quantum revolution. As quantum hardware scales and quantum protocols move from labs to real-world deployment, security experts will need to collaborate with physicists like never before ... Read More

    Qubits: A Brief Introduction for Cybersecurity Professionals

    A qubit is the quantum analog of a classical bit – it’s the basic unit of quantum information. However, unlike a classical bit that can only be 0 or 1 at any given time, a qubit can exist in a combination of both 0 and 1 states simultaneously. This property ... Read More

    Bell States: An Introduction for Cybersecurity Professionals

    Bell states are a set of four specific quantum states of two qubits (quantum bits) that are entangled. In simple terms, an entangled pair of qubits behaves as one system, no matter how far apart they are. Bell states are the simplest and most extreme examples of this phenomenon​. They ... Read More

    Marin Ivezic

    Marin Ivezic I am the Founder of Applied Quantum, a research-driven professional services firm dedicated to helping organizations unlock the transformative power of quantum technologies. Alongside leading its specialized service, Secure Quantum—focused on quantum resilience and post-quantum cryptography—I also invest in cutting-edge quantum ventures through Quantum.Partners. Currently, I’m completing a PhD in Quantum Computing and authoring an upcoming book “Practical Quantum Resistance,”while regularly sharing news and insights on quantum computing and quantum security at PostQuantum.com. More about me.

    Post-Quantum Cryptography (PQC) and Post-Quantum Security Articles

    Quantum Computing Articles

    Quantum Computing Architectures / Paradigms / Categories

    Quantum Networks Articles

    Quantum AI Articles