Post-Quantum, PQC, Quantum Security

The Hidden Subgroup Problem (HSP): One Framework to Break Them All

Every public-key cryptosystem deployed today – RSA, Diffie-Hellman, and elliptic curve cryptography – falls to a single mathematical framework called the Hidden Subgroup Problem (HSP). This is not a coincidence: Shor’s algorithm, in each of its variants, works by exploiting the Quantum Fourier Transform (QFT) to identify a hidden subgroup inside a finite abelian group. The implication is stark. A cryptanalytically relevant quantum computer (CRQC) capable of breaking any one of these systems possesses the mathematical machinery to break all three, because the underlying algorithm is fundamentally the same. Understanding the HSP is therefore the key to understanding why the quantum threat to classical public-key cryptography is comprehensive rather than piecemeal.

The HSP framework did not appear fully formed. Peter Shor’s 1994 algorithms for factoring and discrete logarithm made no mention of hidden subgroups. The unification emerged gradually through work by Alexei Kitaev (1995), Dan Boneh and Richard Lipton (1995), and Michele Mosca and Artur Ekert (1998), crystallizing into the framework we recognize today by the early 2000s.

Groups, subgroups, and the algebra beneath cryptography

A group is a set $$G$$ equipped with a binary operation (written multiplicatively as $$\cdot$$ or additively as $$+$$) satisfying four axioms: closure, associativity, identity, and inverses. The integers under addition form a group. So do the nonzero integers modulo a prime $$p$$ under multiplication. These are not abstract curiosities – they are the algebraic structures upon which public-key cryptography is built.

A subgroup $$H$$ of $$G$$ (written $$H \le G$$) is a subset that is itself a group under the same operation. The even integers form a subgroup of the integers. The set $$\{1, -1\}$$ forms a subgroup of the nonzero rationals under multiplication. Every group has at least two subgroups: the trivial subgroup $$\{e\}$$ containing only the identity, and the group itself.

A group is abelian (or commutative) if $$ab = ba$$ for all elements $$a, b$$. The integers under addition are abelian; the group of invertible $$n \times n$$ matrices under multiplication is not (for $$n \ge 2$$). This distinction – abelian versus non-abelian – turns out to be the precise mathematical boundary between quantum-vulnerable and potentially quantum-resistant cryptography.

Cosets partition a group relative to a subgroup. Given $$H \le G$$ and an element $$g \in G$$, the left coset $$gH = \{gh : h \in H\}$$ is the set obtained by “shifting” $$H$$ by $$g$$. For abelian groups (where left and right cosets coincide), these cosets tile the group without overlap: every element of $$G$$ belongs to exactly one coset of $$H$$. The number of distinct cosets is the index $$[G : H] = |G|/|H|$$, a consequence of Lagrange’s theorem.

When $$H$$ is a normal subgroup (every left coset equals the corresponding right coset), the set of cosets itself forms a group called the quotient group $$G/H$$. For abelian groups, every subgroup is automatically normal – a fact that simplifies the entire HSP framework considerably.

The specific groups that matter for cryptography are:

Cyclic groups $$\mathbb{Z}_N$$: the integers $$\{0, 1, \ldots, N-1\}$$ under addition modulo $$N$$. RSA’s security connects to the structure of $$\mathbb{Z}_N$$ for composite $$N$$.

Multiplicative groups $$(\mathbb{Z}/N\mathbb{Z})^*$$: the integers coprime to $$N$$, under multiplication modulo $$N$$. The order-finding problem (central to factoring) lives here.

Elliptic curve groups $$E(\mathbb{F}_q)$$: the points on an elliptic curve over a finite field form a finite abelian group under the chord-and-tangent addition law. For cryptographic curves, this group is typically cyclic of prime order $$r$$, isomorphic to $$\mathbb{Z}_r$$.

Direct products $$\mathbb{Z}_r \times \mathbb{Z}_r$$: pairs $$(a, b)$$ with componentwise addition modulo $$r$$. The discrete logarithm problem – whether over finite fields or elliptic curves — becomes an HSP over such a direct product.

The Fundamental Theorem of Finitely Generated Abelian Groups guarantees that every finite abelian group decomposes as a direct product of cyclic groups: $$G \cong \mathbb{Z}_{t_1} \times \mathbb{Z}_{t_2} \times \cdots \times \mathbb{Z}_{t_k}$$. This decomposition is what makes the Quantum Fourier Transform universally applicable to abelian HSP instances – but we are getting ahead of ourselves.

The formal definition of the Hidden Subgroup Problem

The HSP has an elegant formal statement. Let $$G$$ be a finite group, $$S$$ a finite set, and $$f : G \to S$$ a function accessible as a quantum oracle. The function $$f$$ is said to hide a subgroup $$H \le G$$ if for all $$g_1, g_2 \in G$$:

$$$f(g_1) = f(g_2) \quad \text{if and only if} \quad g_1 H = g_2 H$$$

Equivalently, $$f$$ is constant on each left coset of $$H$$ and takes distinct values on different cosets. The goal is to find a generating set for $$H$$ using as few queries to $$f$$ as possible. Trivially, one can determine $$H$$ by evaluating $$f$$ on all $$|G|$$ elements, but the interesting question is whether $$H$$ can be identified in time polynomial in $$\log |G|$$ – exponentially faster.

The problem formulation in this generality did not appear in a single paper. Kitaev’s 1995 paper “Quantum measurements and the Abelian Stabilizer Problem” is widely credited as the intellectual origin of the general framework. Kitaev formulated the “Abelian Stabilizer Problem” – given an abelian group $$G$$ acting on a set, find the stabilizer subgroup – and explicitly noted that this “includes both factoring and the discrete logarithm.” His approach, based on eigenvalue estimation of unitary operators, provided a fundamentally different method from Shor’s while solving the same class of problems.

Independently, Boneh and Lipton at CRYPTO 1995 introduced the concept of “hidden linear functions,” showing that any cryptosystem based on such structures could be broken in quantum polynomial time, and extending the discrete logarithm attack to arbitrary groups including elliptic curves. The exact term “Hidden Subgroup Problem” crystallized around 1997–1998, appearing prominently in the title of Mosca and Ekert’s 1998 paper “The Hidden Subgroup Problem and Eigenvalue Estimation on a Quantum Computer.” By the time of Jozsa’s influential 2001 survey in Computing in Science & Engineering and Lomont’s comprehensive 2004 review, the HSP had become the canonical framework for understanding quantum algorithmic speedups.

Simon’s problem opened the door

Daniel Simon’s 1994 algorithm was the first to demonstrate exponential quantum speedup via hidden subgroup structure, and it directly inspired Shor’s far more consequential algorithms. Simon originally submitted his result to STOC 1993, where it was rejected – but Peter Shor, serving on the program committee, immediately recognized the potential for applying the same algorithmic structure to concrete problems like factoring.

Simon’s problem is the HSP over the group $$G = (\mathbb{Z}/2\mathbb{Z})^n$$ – the $$n$$-dimensional vector space over the binary field, with bitwise XOR as the group operation. Given a function $$f : \{0,1\}^n \to \{0,1\}^n$$ with the promise that there exists a secret string $$\mathbf{s} \in \{0,1\}^n$$ such that $$f(\mathbf{x}) = f(\mathbf{y})$$ if and only if $$\mathbf{x} \oplus \mathbf{y} \in \{\mathbf{0}, \mathbf{s}\}$$, the goal is to find $$\mathbf{s}$$. The hidden subgroup is $$H = \{\mathbf{0}, \mathbf{s}\}$$, a subgroup of order 2 (or order 1 if $$\mathbf{s} = \mathbf{0}$$).

Simon’s quantum algorithm proceeds in five steps. First, prepare a uniform superposition over all $$n$$-bit strings. Second, evaluate $$f$$ coherently in a second register. Third, measure the second register, collapsing the first register to a superposition over a coset: $$(1/\sqrt{2})(|\mathbf{x}\rangle + |\mathbf{x} \oplus \mathbf{s}\rangle)$$. Fourth, apply the Quantum Fourier Transform over $$(\mathbb{Z}/2\mathbb{Z})^n$$ – which is simply the $$n$$-fold Hadamard transform $$H^{\otimes n}$$. Fifth, measure to obtain a random string $$\mathbf{y}$$ satisfying $$\mathbf{y} \cdot \mathbf{s} = 0 \pmod{2}$$. After $$O(n)$$ repetitions, the resulting system of linear equations over $$\text{GF}(2)$$ determines $$\mathbf{s}$$ uniquely.

The classical lower bound for this problem is $$\Omega(2^{n/2})$$ queries – a birthday-bound argument shows that any classical algorithm must evaluate $$f$$ exponentially many times to find a collision. Simon’s quantum algorithm uses only $$O(n)$$ queries. This exponential gap made the theoretical community take notice and set the stage for Shor’s breakthrough.

Shor’s algorithm is three HSP instances wearing different masks

Shor’s 1994 algorithms for integer factoring and discrete logarithm, presented at FOCS 1994 and published in SIAM Journal on Computing in 1997, are arguably the most consequential results in quantum computing. What Shor did not emphasize – and what the community recognized only gradually – is that all variants of his algorithm are instances of the abelian HSP, differing only in the choice of group and oracle function.

Integer factoring reduces to order-finding, which is HSP over $$\mathbb{Z}$$. To factor a composite integer $$N$$, choose a random $$a$$ coprime to $$N$$ and find the multiplicative order $$r$$ – the smallest positive integer such that $$a^r \equiv 1 \pmod{N}$$. If $$r$$ is even and $$a^{r/2} \not\equiv -1 \pmod{N}$$, then $$\gcd(a^{r/2} \pm 1, N)$$ yields nontrivial factors. This classical reduction (due to Miller, 1976) succeeds with probability at least $$1/2$$ for random $$a$$.

Order-finding is an HSP over the integers $$\mathbb{Z}$$ (or practically, over $$\mathbb{Z}_M$$ for $$M \gg r^2$$). The function is $$f(x) = a^x \bmod N$$, and $$f(x) = f(y)$$ precisely when $$r$$ divides $$(x – y)$$. The hidden subgroup is $$r\mathbb{Z} = \{0, \pm r, \pm 2r, \ldots\}$$, the cyclic subgroup generated by the unknown order. The QFT over $$\mathbb{Z}_M$$ transforms the periodic coset state into a distribution concentrated near multiples of $$M/r$$, from which continued fraction expansion extracts $$r$$.

The discrete logarithm over finite fields is HSP over $$\mathbb{Z}_{p-1} \times \mathbb{Z}_{p-1}$$. Given a prime $$p$$, a generator $$g$$ of $$\mathbb{Z}_p^*$$, and a target $$x = g^s \bmod p$$, define $$f(\alpha, \beta) = g^{\alpha} \cdot x^{-\beta} \bmod p$$. Since $$x = g^s$$, this simplifies to $$g^{\alpha – s\beta}$$, and $$f(\alpha, \beta) = f(\alpha’, \beta’)$$ if and only if $$\alpha – s\beta \equiv \alpha’ – s\beta’ \pmod{p-1}$$. The hidden subgroup is $$H = \langle (s, 1) \rangle$$, the cyclic subgroup of $$\mathbb{Z}_{p-1} \times \mathbb{Z}_{p-1}$$ generated by the pair $$(s, 1)$$. The two-dimensional QFT produces measurement outcomes from which $$s$$ is recovered.

The elliptic curve discrete logarithm is HSP over $$\mathbb{Z}_r \times \mathbb{Z}_r$$. Given a base point $$P$$ of order $$r$$ on an elliptic curve and $$Q = sP$$, define $$f(a, b) = aP + bQ$$. Since $$Q = sP$$, this equals $$(a + bs)P$$, and $$f(a, b) = f(a’, b’)$$ if and only if $$a + bs \equiv a’ + b’s \pmod{r}$$. The hidden subgroup is $$H = \langle (s, -1) \rangle$$, isomorphic to $$\mathbb{Z}_r$$. The structure is identical to the finite-field case – only the underlying group arithmetic changes from modular multiplication to elliptic curve point addition.

The following table summarizes all three reductions:

ProblemGroup GFunction fHidden subgroup H
Factoring (order-finding)$$\mathbb{Z}$$$$f(x) = a^x \bmod N$$$$r\mathbb{Z}$$ (order $$r$$)
Finite-field DLP$$\mathbb{Z}_{p-1} \times \mathbb{Z}_{p-1}$$$$f(\alpha, \beta) = g^{\alpha} \cdot x^{-\beta} \bmod p$$$$\langle (s, 1) \rangle$$
ECDLP$$\mathbb{Z}_r \times \mathbb{Z}_r$$$$f(a,b) = aP + bQ$$$$\langle (s, -1) \rangle$$

The Quantum Fourier Transform turns periodicity into measurement outcomes

The QFT is the engine that powers every abelian HSP algorithm. For the cyclic group $$\mathbb{Z}_N$$, it maps each computational basis state $$|j\rangle$$ to:

$$$\text{QFT}_N : |j\rangle \to \frac{1}{\sqrt{N}} \sum_{k=0}^{N-1} \omega^{jk} |k\rangle, \quad \text{where } \omega = e^{2\pi i / N}$$$

This is a unitary change of basis from “position space” to “frequency space.” For a general finite abelian group $$G \cong \mathbb{Z}_{t_1} \times \cdots \times \mathbb{Z}_{t_k}$$, the QFT decomposes as a tensor product: $$\text{QFT}_G = \text{QFT}_{t_1} \otimes \cdots \otimes \text{QFT}_{t_k}$$. Each factor can be implemented using $$O(\log^2 t_i)$$ quantum gates, making the entire QFT efficient.

The connection to character theory makes the mechanism precise. A character of an abelian group $$G$$ is a homomorphism $$\chi : G \to \mathbb{C}^*$$. For $$\mathbb{Z}_N$$, the characters are $$\chi_j(k) = \omega_N^{jk}$$. The set of all characters forms the dual group $$\hat{G}$$, which for finite abelian groups is isomorphic to $$G$$ itself. The QFT is precisely the change of basis from group elements to characters: it maps $$|j\rangle$$ to the character state $$|\chi_j\rangle$$.

Here is how this extracts hidden subgroups. After preparing a uniform superposition over $$G$$, evaluating the oracle $$f$$ coherently, and measuring the function register, the state of the group register collapses to a uniform superposition over a random coset $$g_0 H$$:

$$$|g_0 H\rangle = \frac{1}{\sqrt{|H|}} \sum_{h \in H} |g_0 + h\rangle$$$

Applying the QFT transforms this to:

$$$\text{QFT}\, |g_0 H\rangle = \sqrt{\frac{|H|}{|G|}} \sum_{\chi \in H^{\perp}} \chi(g_0)\, |\chi\rangle$$$

where $$H^{\perp} = \{\chi \in \hat{G} : \chi(h) = 1 \text{ for all } h \in H\}$$ is the orthogonal complement (annihilator) of $$H$$ in the dual group. Measurement yields a uniformly random element of $$H^{\perp}$$.

The fundamental insight is that the QFT converts “hiding in position space” to “revealing in frequency space.” The function $$f$$ hides $$H$$ by being constant on cosets – this periodicity in the spatial domain becomes concentration on $$H^{\perp}$$ in the frequency domain. Each measurement produces one linear constraint on $$H$$. After $$O(\log |G|)$$ repetitions, enough constraints accumulate to determine $$H$$ uniquely.

Why this works for abelian groups – but not beyond

The abelian HSP admits a polynomial-time quantum algorithm for any finitely generated abelian group. This sweeping result – essentially due to Kitaev (1995), building on Shor (1994) and Simon (1994) – rests on three structural facts about abelian groups that all fail in the non-abelian case.

First, all irreducible representations of an abelian group are one-dimensional – they are precisely the characters. Each Fourier measurement therefore produces a single scalar label that directly constrains the hidden subgroup. Second, the Fundamental Theorem guarantees a decomposition into cyclic factors, enabling the QFT to factorize into independent, efficiently implementable components. Third, because all group elements commute, the regular representation can be simultaneously diagonalized – the QFT is precisely this diagonalization.

Ettinger, Høyer, and Knill proved in 2004 (Information Processing Letters 91(1):43–48) that the query complexity of the HSP is polynomial – $$O(\log^4 |G|)$$ – for any finite group, abelian or not. The information needed to identify $$H$$ can always be gathered efficiently. But their algorithm requires exponential classical post-processing for non-abelian groups. The bottleneck is not information acquisition but information extraction.

For non-abelian groups, irreducible representations can be higher-dimensional ($$d_\rho > 1$$). Fourier sampling then produces not scalar character values but entries within $$d_\rho \times d_\rho$$ matrices. The information about $$H$$ is spread across these matrix entries rather than concentrated in clean scalar outcomes. Hallgren, Russell, and Ta-Shma showed (SIAM Journal on Computing 32(4):916–934, 2003) that the “standard method” – weak Fourier sampling measuring only the representation label – can determine only the normal core of $$H$$ (the largest normal subgroup of $$G$$ contained in $$H$$). For normal subgroups this suffices, but for non-normal subgroups it is provably inadequate.

Two non-abelian HSP instances have attracted particular attention. The dihedral group $$D_N$$ – whose HSP connects to lattice problems relevant to post-quantum cryptography – resists polynomial-time solution despite having only two-dimensional irreducible representations. The best known algorithm, due to Kuperberg (2005), runs in subexponential time $$2^{O(\sqrt{\log N})}$$. The symmetric group $$S_n$$ — whose HSP encodes graph isomorphism – is even harder. Moore and Russell (2008) proved that strong Fourier sampling cannot solve HSP over $$S_n$$ at all, because the exponentially large dimensions of typical representations dilute information beyond recovery.

One quantum circuit template rules every abelian instance

A remarkable feature of the abelian HSP is that every instance – Simon’s problem, factoring, discrete logarithm, ECDLP – follows an identical five-step quantum circuit template:

  1. Superposition preparation. Initialize a register over $$G$$ in a uniform superposition: $$(1/\sqrt{|G|}) \sum_{g \in G} |g\rangle$$. For $$G = \mathbb{Z}_{t_1} \times \cdots \times \mathbb{Z}_{t_k}$$, this uses Hadamard-like gates on each register.
  2. Coherent function evaluation. Apply the problem-specific oracle $$U_f$$ to compute $$f$$ in a second register: $$\sum_g |g\rangle|f(g)\rangle$$.
  3. QFT over $$G$$. Apply the Quantum Fourier Transform adapted to $$G$$’s cyclic decomposition: $$\text{QFT}_{t_1} \otimes \cdots \otimes \text{QFT}_{t_k}$$.
  4. Measurement. Measure the first register in the computational basis to obtain a random element of $$H^{\perp}$$.
  5. Classical post-processing. Repeat $$O(\log |G|)$$ times and solve the resulting system of linear constraints to recover generators of $$H$$.

What varies across instances is solely the oracle — modular exponentiation for factoring, modular multi-exponentiation for discrete logarithm, elliptic curve scalar multiplication for ECDLP. The quantum-algorithmic structure — the superposition, the QFT, the measurement, the post-processing — is identical. This universality is what the HSP framework captures. It explains why quantum computing does not merely pose three separate threats to three separate cryptosystems, but a single, unified threat arising from one algorithmic paradigm.

How the framework emerged: from three algorithms to one theory

The historical development of the HSP framework is a case study in how theoretical computer science recognizes deep structure beneath surface-level diversity.

Phase one: the breakthroughs (1993–1994). Simon’s 1994 FOCS paper “On the Power of Quantum Computation” demonstrated exponential quantum speedup for a problem over $$(\mathbb{Z}/2\mathbb{Z})^n$$. Shor’s 1994 FOCS paper “Algorithms for Quantum Computation: Discrete Logarithms and Factoring” extended the core idea to cyclic groups $$\mathbb{Z}_N$$, yielding efficient algorithms for factoring and discrete logarithm. Crucially, Shor framed his results as period-finding, not as hidden subgroup identification. Simon himself noted that Shor “immediately saw the potential (that I had had absolutely no inkling of, to be honest) for applying the same general algorithm structure to concrete problems.”

Phase two: the generalization (1995). Kitaev’s November 1995 paper “Quantum measurements and the Abelian Stabilizer Problem” made the first major conceptual leap. He formulated the Abelian Stabilizer Problem – finding the stabilizer subgroup of an abelian group action – explicitly noted it “includes both factoring and the discrete logarithm,” and described his method as “a generalization of Simon’s procedure for finding a certain group of characters.” Simultaneously, Boneh and Lipton at CRYPTO 1995 introduced “hidden linear functions” and extended the discrete logarithm attack to all groups, including elliptic curves.

Phase three: naming and crystallization (1997–1999). The term “Hidden Subgroup Problem” emerged gradually. Mosca and Ekert’s 1998 paper bore it explicitly in the title – “The Hidden Subgroup Problem and Eigenvalue Estimation on a Quantum Computer” – and showed how order-finding, factoring, and discrete logarithm all fit within this framework. By the late 1990s, the HSP had become the standard way to discuss quantum algorithmic speedups.

Phase four: maturation (2000–2010). Hallgren, Russell, and Ta-Shma (STOC 2000) formalized the standard method for non-abelian groups and established its limitations. Jozsa’s 2001 survey in Computing in Science & Engineering drew out “the unifying generalization of the so-called abelian hidden subgroup problem” for a broad audience. Ettinger, Høyer, and Knill (2004) settled the query complexity. Lomont’s 83-page 2004 review provided unified proofs and notation. Childs and Van Dam’s 2010 article in Reviews of Modern Physics gave the definitive treatment, placing HSP at the center of quantum algorithmic theory.

The cryptographic consequences of a unified quantum threat

The HSP framework delivers a sobering conclusion for pre-quantum public-key cryptography. RSA, Diffie-Hellman, DSA, ElGamal, and all elliptic curve schemes derive their security from problems that are instances of the abelian HSP. The security of RSA rests on integer factoring – HSP over $$\mathbb{Z}$$. The security of Diffie-Hellman and DSA rests on the discrete logarithm problem in finite fields – HSP over $$\mathbb{Z}_{p-1} \times \mathbb{Z}_{p-1}$$. The security of ECDSA and ECDH rests on the elliptic curve discrete logarithm problem – HSP over $$\mathbb{Z}_r \times \mathbb{Z}_r$$. All abelian. All solvable in polynomial time by the same quantum algorithm.

This means the quantum threat is structural, not incidental. Migrating from RSA to elliptic curves – a transition the cryptographic community undertook for efficiency gains – provides zero quantum resistance. The algebraic structure that makes ECC efficient (a cyclic group of prime order with fast arithmetic) is the same structure that makes it vulnerable (an abelian group admitting an efficient QFT).

The resource requirements differ quantitatively – breaking RSA-2048 requires more qubits than breaking ECC-256 – but the qualitative capability is identical. A CRQC that can run Shor’s algorithm at the scale needed for any one of these problems has already demonstrated mastery of the QFT, coherent arithmetic oracles, and classical post-processing that constitute the universal abelian HSP solver.

The silver lining is that the abelian/non-abelian boundary provides a precise mathematical criterion for quantum resistance. Lattice-based cryptography connects to the dihedral HSP, where only Kuperberg’s subexponential (not polynomial) algorithm is known. Code-based cryptography relates to HSP over the symmetric group, where Moore and Russell’s impossibility results apply. Hash-based signatures and multivariate schemes rest on problems with no known HSP reduction at all. The post-quantum migration is, at its mathematical core, a migration from abelian HSP-based hardness assumptions to problems that lie beyond the reach of Fourier sampling over commutative groups.

The algebra of vulnerability

The Hidden Subgroup Problem is not merely a theoretical curiosity but the mathematical spine of the quantum threat to classical cryptography. Three insights distinguish the HSP perspective from a naive “Shor breaks RSA” framing. First, the unity is deeper than the algorithms – factoring, discrete log, and ECDLP are not three problems that happen to have quantum solutions but three manifestations of a single problem (abelian HSP) that admits a single solution (QFT-based Fourier sampling). Second, the boundary between vulnerable and resistant is algebraic- abelian groups yield to polynomial-time quantum algorithms because their representations are one-dimensional; non-abelian groups resist because higher-dimensional representations dilute Fourier-sampled information. Third, the framework predicts the scope of the threat – any future cryptosystem whose security reduces to an abelian HSP instance will be quantum-vulnerable regardless of its superficial novelty.

The progression from Simon (1994) through Shor (1994) and Kitaev (1995) to the modern HSP framework represents one of the most elegant unifications in computational complexity theory. It transformed three disconnected algorithmic results into a single theoretical edifice, grounded in the representation theory of finite groups and the remarkable alignment between quantum mechanics and abstract algebra. For the cryptographic community, the message is clear: understanding the HSP is not optional background but essential knowledge for navigating the post-quantum transition.

Quantum Upside & Quantum Risk - Handled

My company - Applied Quantum - helps governments, enterprises, and investors prepare for both the upside and the risk of quantum technologies. We deliver concise board and investor briefings; demystify quantum computing, sensing, and communications; craft national and corporate strategies to capture advantage; and turn plans into delivery. We help you mitigate the quantum risk by executing crypto‑inventory, crypto‑agility implementation, PQC migration, and broader defenses against the quantum threat. We run vendor due diligence, proof‑of‑value pilots, standards and policy alignment, workforce training, and procurement support, then oversee implementation across your organization. Contact me if you want help.

Talk to me Contact Applied Quantum

Marin

I am the Founder of Applied Quantum (AppliedQuantum.com), a research-driven consulting firm empowering organizations to seize quantum opportunities and proactively defend against quantum threats. A former quantum entrepreneur, I’ve previously served as a Fortune Global 500 CISO, CTO, Big 4 partner, and leader at Accenture and IBM. Throughout my career, I’ve specialized in managing emerging tech risks, building and leading innovation labs focused on quantum security, AI security, and cyber-kinetic risks for global corporations, governments, and defense agencies. I regularly share insights on quantum technologies and emerging-tech cybersecurity at PostQuantum.com.
Share via
Copy link
Powered by Social Snap