-
## Overview
One common problem around dense vector search is the amount of memory required to implement a solution that delivers high performance and recall. The problem is grounded in the fact tha…
-
We need to create a super class here...e.g.: SVM + LR
-
At some point in the future, we should migrate to using post-quantum cryptography.
This means the following:
1. A new version of SigSum that uses Ed25519 + PQ Signatures.
2. Support for hybrid …
-
When the composite sigs draft was adopted, the WG concluded that this was a useful technology, but only useful in certain places. I suggest adding an "Applicability Statement" to the draft, calling ou…
-
Look at different methods of search.
- https://github.com/google-research/google-research/tree/master/scann
- https://github.com/facebookresearch/faiss
- https://github.com/nmslib/hnswlib
- http…
-
- Flood Susceptibility Mapping (FSM) involves identifying areas prone to flooding to mitigate future floods and assess susceptibility.
- Floods are among the most destructive natural disasters, causi…
-
A few days ago NIST standardized 3 PQC, algorithms:
NIST 203: ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism Standard, based on: Crystals Kyber)
NIST 204: ML-DSA (Module-Lattice-Based Di…
-
Presently, algorithms must be captured as a single KiSAO term. This creates the need to create additional terms for each hybrid combination. A more flexible approach would be to allow inline descripti…
-
The new code points for ML-KEM hybrid key exchange in TLS are now available in https://datatracker.ietf.org/doc/draft-kwiatkowski-tls-ecdhe-mlkem/
Note that order of concatenation has changed since…
-
Team Name: The_Five_Stooges
Babcock, Trenten; tbabcock@deloitte.com
Certo, Sal scerto@deloitte.com
Project Description:
The Quantum team is experimenting with DWAVE's optimization methods to c…