Kaushal Kumar Singh

55 posts

Kaushal Kumar Singh banner
Kaushal Kumar Singh

Kaushal Kumar Singh

@TheCyyber

Lead Blockchain Developer - @QRLedger

India Katılım Ekim 2013
32 Takip Edilen262 Takipçiler
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
@inner_concerns Started with pre-requisite knowledge required to understand it. So my first book is "An Introduction to Mathematical Cryptography".
English
2
0
2
45
HTX
HTX@HTX_Global·
project you bullieve in? 👀
English
1.1K
110
912
72.8K
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
As the quantum threat to current cryptography becomes harder to ignore, exchanges may want to start evaluating projects already built for that future. Quantum Resistant Ledger ( $QRL ) is a live Layer 1 using hash-based signatures since 2018 - not a planned upgrade. Referenced in Google Quantum AI research: quantumai.google/static/site-as… And in a Lockheed Martin patent: patents.google.com/patent/US20240… @upbitglobal - worth a closer look. #PostQuantum #Blockchain #Crypto
English
0
11
39
811
CoinMarketCap
CoinMarketCap@CoinMarketCap·
Which project? What they promised: ■■■□□ What they delivered: ■■■■■
English
289
30
277
30.2K
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
@r8raq Standardized PQ cryptography gives us signatures and KEMs, but migration isn’t just about primitives. We still lack NIST-level, well-reviewed solutions for aggregation, efficient ZK, and composability-key gaps for real-world systems.
English
1
1
2
138
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Post-quantum cryptography is progressing, but we're not "done." We have: • Dilithium, Falcon, XMSS, SPHINCS+ (signatures) • Kyber (KEMs) But we still lack: • Efficient ZK • Threshold & multi-sig (mature) • BLS-like aggregation The hard part is just beginning. #PostQuantum #Crypto #Blockchain
English
15
13
83
6.5K
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Based on my current understanding of ZK, I don't think STARK-proving CRYSTALS-Dilithium (ML-DSA-87) verification is efficient for small batches if we keep the NIST-standardized hash functions unchanged. The same likely applies to SPHINCS+ / SLH-DSA: it may be provable, but not cheap enough to act like practical signature aggregation & the prover memory requirements can also be substantial.
English
2
1
4
268
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Thank you for explaining zero-knowledge proofs in such an accessible way. I've just ordered the book. I'm interested in exploring the topic more deeply from a technical perspective-could you recommend additional resources that cover the mathematics and cryptography required to implement advanced ZK protocols?
English
1
1
9
191
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Everyone's chasing the next $1 billion coin… but ignoring the one problem that could break them all: quantum risk. Quantum Resistant Ledger ( $QRL ) solved this in 2018 - live mainnet, not a roadmap. Referenced by Google Quantum AI: quantumai.google/static/site-as… And in a Lockheed Martin patent: patents.google.com/patent/US20240… Most people haven't noticed yet. That's how early it still is. @Bybit_Official @benbybit - are you watching? #PostQuantum #Crypto #Blockchain
English
1
12
44
929
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Quantum Resistant Ledger ( $QRL ) has been live since 2018, already implementing post-quantum security using hash-based signatures (XMSS), not waiting for a future upgrade. Referenced by: • Google Quantum AI research quantumai.google/static/site-as… • Lockheed Martin patent patents.google.com/patent/US20240… Real, production-ready PQC infrastructure exists today - it's just being overlooked.
English
0
3
22
219
Oleribe
Oleribe@Oleribeweb30·
quantum computing breaking current encryption is a known problem most crypto projects are just pretending it won't happen @quipnetwork is literally building the defense layer right now post quantum security on btc eth sol without touching the underlying chains plus a shared compute marketplace so you don't need a $20m machine to access quantum hardware airdrop still live, nodes running on normal machines most people haven't noticed yet and that's the point
Oleribe tweet media
English
45
0
43
2.3K
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Quantum risk is approaching, and hardware wallets need to be ready. Future devices should be designed to easily support post-quantum schemes like ML-DSA-87 and SPHINCS+ - without extreme optimization tradeoffs. Building PQ-ready hardware today will define crypto security tomorrow. @Ledger - hope this is already part of the roadmap. 🔐⚛️ #PostQuantum #Crypto #Blockchain
English
1
7
39
1.1K
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
@WySiWyG2076 @QSecurity4all Honestly, what surprised me most is how fast post-quantum crypto matured on paper but how slow it's been to actually get adopted. With NIST standardizing PQC, it's not really a theoretical problem anymore. Now it's more about whether real-world systems catch up in time.
English
1
2
16
185
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
When should the crypto ecosystem start taking quantum threats seriously? Honestly, I think the answer is already now — just not in a panic mode. 🧵👇
English
13
6
22
563
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Personally, I don’t think quantum is a "tomorrow problem". But it’s also not a "ignore until it hits" problem. It’s one of those things where early preparation is the only realistic option.
English
0
1
7
183
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Standards are already coming out of NIST. And some projects didn’t wait for the problem to become urgent. Quantum Resistant Ledger ( $QRL ) is one example - built around XMSS from day one.
English
0
6
20
295
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
So "taking it seriously" doesn’t mean hype or fear. It means: • Designing for crypto agility • Thinking about migration paths early • Reducing unnecessary key exposure Basic engineering discipline.
English
0
2
6
121
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
There’s also the part people ignore: Public keys exposed today don’t disappear. They can be stored now and attacked later. Especially for chains where keys are already revealed.
English
0
3
11
133
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Once large-scale quantum machines exist, algorithms like Shor’s algorithm won’t give you a warning period. Attackers need a short window. Defenders need years of coordination. That mismatch is the real risk.
English
0
3
9
110
Kaushal Kumar Singh
Kaushal Kumar Singh@TheCyyber·
Even today, most users still reuse addresses, don’t rotate keys, and delay upgrades. Expecting a smooth post-quantum migration across the entire ecosystem is… optimistic.
English
0
1
6
108