Search results

20 items matching your search terms.
Filter the results.
Item type





























































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study Post-Quantum Cryptography: Current state and quantum mitigation
This study provides an overview of the current state of affairs on the standardization process of Post-Quantum Cryptography (PQC). It presents the 5 main families of PQ algorithms; viz. code-based, isogeny-based, hash-based, lattice-based and multivariate-based. It also describes the NIST Round 3 finalists for encryption and signature schemes, as well as the alternative candidate schemes. Given that the NIST process will still run for a few years, the last chapter offers 2 proposals that system owners can implement now in order to protect the confidentiality of their data against a quantum capable attacker; namely hybrid implementations that use a combination of pre-quantum and post-quantum schemes, and the mixing of pre-shared keys into all keys established via public-key cryptography.
Located in Publications
Report/Study ECMAScript program Crypto Assets: Introduction to Digital Currencies and Distributed Ledger Technologies
This report aims to increase the understanding of blockchain technologies. It aims to explain the underlying technical concepts and how they relate to each other. The goal is to explain the components, and illustrate their use by pointing to deployed instances where the ideas are utilized. With this frst introductory study focusing on the rise of cryptocurrencies & DLT, the European Union Agency for Cybersecurity is launching a series of information security studies in the area of crypto-assets to support policy-makers and raise awareness on the arising security and data protection.
Located in Publications
Working for ENISA
Located in Recruitment
The importance of cryptography for the digital society
Following the Council meeting on 8th and 9th December 2016 in Brussels, ENISA’s paper gives an overview into aspects around the current debate on encryption, while highlighting the Agency’s key messages and views on the topic.
Located in News / ENISA News
File hotels - special rates
Located in Events / 2nd International Conference (Athens, 2013)
Report/Study Looking into the crystal ball: A report on emerging technologies and security challenges
The time has come for ENISA to take a look at the crystal ball of technology; In particular looking at what are considered to be emerging technologies and what might be their prospective usage scenarios. Considering emerging technologies and applications is an important step in assessing future security needs.
Located in Publications
File ENISA’s Opinion Paper on Encryption
Strong Encryption Safeguards our Digital Identity
Located in Publications / ENISA position papers and opinions
Udo Helmbrecht speaks about the need for a strong cybersecurity environment at Think Digital Summit
Located in News / ENISA News
Estonia - Cryptographic Algorithms Lifecycle Report 2016 published
Estonian Information System Authority (RIA) and Cybernetica have published the "Cryptographic Algorithms Lifecycle Report 2016".
Located in About ENISA / / National Liaison Officers (NLOs) / News from the Member States
Knowledge-building on Cryptography for eIDAS Supervisory Bodies
Today and yesterday, ENISA, the European Union Agency for Cybersecurity organised a two-day knowledge-building event on cryptography, specifically for the national supervisory bodies for electronic trust services and electronic signatures.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information