Deep Dives are PostQuantum.com’s long-form research series. Each one explores a major quantum technology or security topic across multiple articles — with a capstone that ties the narrative together, individual articles that go deep on each dimension, and (where relevant) interactive tools and companion databases. Within each series, articles are designed to be read in sequence or used as standalone reference when you need them. The twelve series below are independent of each other — start with whichever topic matters most to you.
A practitioner’s roadmap for launching and running a quantum-readiness program — from boardroom mandate and budget justification through cryptographic discovery, CBOM construction, risk scoring, hybrid pilots, infrastructure hardening, and vendor governance.
The complete quantum security landscape for CISOs and security leaders, mapped across sixteen concepts: the algorithms quantum computers will break, the resource estimates that keep shrinking, the HNDL and Trust Now Forge Later threats active today, the NIST standards now shipping in production, the CNSA 2.0 deadlines, and the migration program that spans upwards of 120,000 tasks in a large enterprise.
The nine capabilities a quantum computer must master to break cryptography — mapped, measured, and scored across modalities. From error correction and magic state production to continuous multi-day operation, plus the total cost and energy analyses.
When will a quantum computer break today’s cryptography? Frameworks, forecasts, and the CRQC Readiness Benchmark — plus the interactive Q-Day Estimator tool, and the argument that regulators have already set the real deadline.
A field guide to every way humanity is trying to build a quantum computer — superconducting, trapped-ion, photonic, neutral-atom, silicon spin, topological, and the exotic frontier. The physics, the trade-offs, the companies, and the honest path to scale.
The hidden supply chains behind every major quantum computing modality. Dilution refrigerators, precision lasers, photonic foundries, isotopically purified silicon — who supplies them, where the bottlenecks are, and who wins if each modality wins.
Detailed profiles of every major quantum hardware company — their modality, roadmap, funding, competitive position, and CRQC relevance — plus a searchable database to compare them all. The capstone analysis reveals the patterns that emerge when you read 60+ roadmaps together.
What will fault-tolerant quantum computers actually be used for? A comprehensive mapping of every major algorithm resource estimate to the real-world problem it solves, the hardware it requires, and the industries it will transform — with honest assessments of where the evidence is strong and where the hype has outrun the science.
How quantum computing moves from monolithic black boxes to modular, open, composable systems — from control electronics and operating systems through heterogeneous architectures to cloud delivery and QaaS.
An honest assessment of China’s national quantum program — cutting through both the hype that inflates its capabilities and the denialism that dismisses them. Policy, investment, talent, infrastructure, and the question the West keeps getting wrong.
Who can build, operate, trust, and control quantum capabilities under geopolitical stress — without being cut off? Export controls, supply chains, alliances, capital, talent, espionage, and the operational playbook for turning sovereignty from ambition into architecture.
A term-by-term field guide to misleading quantum technology marketing. Nine fabricated red-flag terms that signal scams or pure hype, seven legitimate physics concepts stripped of their qualifying assumptions in vendor pitches, a capstone mapping the patterns, and a companion guide to the 16 deflection tactics questionable vendors deploy when you ask hard questions.