Marin’s Q-Day Prediction Countdown:

Here is my personal Q-Day prediction. For an understanding of the factors I am considering and recent events that are influencing this prediction, please see Marin’s Q-Day Prediction page.

Most Popular Articles This Week

    June 19, 2025

    Q-Day Revisited – RSA-2048 Broken by 2030: Detailed Analysis

    It’s time to mark a controversial date on the calendar: 2030 is the year RSA-2048 will be broken by a…
    November 1, 2021

    Ready for Quantum: Practical Steps for Cybersecurity Teams

    The journey towards quantum resistance is not merely about staying ahead of a theoretical threat but about evolving our cybersecurity…
    August 23, 2024

    Full Stack of AI Concerns: Responsible, Safe, Secure AI

    As AI continues to evolve and integrate deeper into societal frameworks, the strategies for its governance, alignment, and security must…
    April 18, 2025

    What Quantum Computers Can Do Better Than Classical Computers

    Quantum computers already outperform classical computers on a few specialized tasks, and over the coming years that list of tasks…
    November 1, 2023

    Taxonomy of Quantum Computing: Modalities & Architectures

    Over the past few decades, researchers have devised multiple quantum computing paradigms – different models and physical implementations of quantum…
    January 1, 2024

    Marin’s Statement on AI Risks

    The rapid development of AI brings both extraordinary potential and unprecedented risks. AI systems are increasingly demonstrating emergent behaviors, and…
    No posts found.

    Adiabatic Quantum Computing (AQC) and Impact on Cyber

    Adiabatic Quantum Computing (AQC), and its variant Quantum Annealing, are another model for quantum computation. It's a specialized subset of quantum computing focused on solving optimization problems by finding the minimum (or maximum) of a given function over a set of possible solutions. For problems that can be presented as ... Read More

    Early History of Quantum Computing

    Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased interest and investment from both the public and private sectors ... Read More

    Entanglement-Based QKD Protocols: E91 and BBM92

    While prepare-and-measure QKD currently leads the market due to simplicity and higher key rates, entanglement-based QKD protocols like E91 and BBM92 are at the heart of next-generation quantum communications. Ongoing improvements in photonic technology are steadily closing the gap in performance. The additional security guarantees (e.g., tolerance of untrusted devices) ... Read More

    Quantum Key Distribution (QKD) and the BB84 Protocol

    Quantum Key Distribution (QKD) represents a radical advancement in secure communication, utilizing principles from quantum mechanics to distribute cryptographic keys with guaranteed security.Unlike classical encryption, whose security often relies on the computational difficulty of certain mathematical problems, QKD's security is based on the laws of physics, which are, as far ... Read More

    The Controlled-NOT (CNOT) Gate in Quantum Computing

    The CNOT gate is to quantum circuits what the XOR gate is to classical circuits: a basic building block for complex operations. By learning how the CNOT gate works and why it matters, cybersecurity experts can better appreciate how quantum computers process information, how they might break cryptography, and how ... Read More

    Random Circuit Sampling (RCS) Benchmark

    At its core, Random Circuit Sampling (RCS) is a way to test how well a quantum computer can generate the output of a complex quantum circuit. Compare the results to what an ideal quantum computer should produce. If the quantum computer’s output closely matches the theoretical expectations, it demonstrates that ... Read More

    The Quantum Computing Threat

    The secret sauce of quantum computing, which even Einstein called "spooky," is the ability to generate and manipulate quantum bits of data or qubits. Certain computational tasks can be executed exponentially faster on a quantum processor using qubits, than on a classical computer with 1s and 0s. A qubit can ... Read More

    Marin Ivezic

    Marin Ivezic I am the Founder of Applied Quantum, a research-driven professional services firm dedicated to helping organizations unlock the transformative power of quantum technologies. Alongside leading its specialized service, Secure Quantum—focused on quantum resilience and post-quantum cryptography—I also invest in cutting-edge quantum ventures through Quantum.Partners. Currently, I’m completing a PhD in Quantum Computing and authoring an upcoming book “Practical Quantum Resistance,”while regularly sharing news and insights on quantum computing and quantum security at PostQuantum.com. More about me.

    Post-Quantum Cryptography (PQC) and Post-Quantum Security Articles

    Quantum Computing Articles

    Quantum Computing Modalities / Architectures / Paradigms

    Quantum Networks Articles

    Quantum AI Articles