The Phoenix Blog

Research insights, technical deep-dives, and industry analysis from the team building the future of post-compromise digital signatures.

Research10 min read

Why Post-Compromise Security Is the Missing Layer in PQC Migration

The cybersecurity industry is racing to adopt post-quantum cryptographic standards. But in the rush to quantum-proof our algorithms, we're ignoring a more fundamental problem: what happens when keys are compromised? PCS offers the answer that PQC alone cannot.

Hung Dang · January 28, 2026
// The PQC migration gap
NIST PQC → Quantum-safe algorithms ✓
Key management → Still assumes "keys stay safe"
Reality: keys WILL be compromised
PhoenixSig → PQC + PCS = Complete solution
└─ Survive compromise autonomously

Latest articles

Technical12 min

Understanding DyLWE: Deterministic State Evolution for Signatures

A deep dive into Dynamic Learning With Rounding — the mathematical core that enables PhoenixSig's forward-secure state evolution without relying on external randomness.

January 20, 2026
Analysis8 min

Phoenix vs. Traditional Key Revocation: What CRL Can't Fix

Certificate Revocation Lists have been the default compromise response for decades. Here's why they fundamentally cannot provide the guarantees that modern environments require — and what replaces them.

January 12, 2026
Industry6 min

CNSA 2.0 and the Defense Cryptographic Timeline

NSA's CNSA 2.0 suite sets aggressive deadlines for post-quantum migration. We break down the timeline, what it means for signature infrastructure, and where PCS fits into the picture.

January 5, 2026
Explainer5 min

Forward Secrecy ≠ Post-Compromise Security: The Distinction That Matters

These two properties are frequently confused. Forward secrecy protects the past. PCS protects the future. Understanding why both require fundamentally different mechanisms is crucial to building resilient systems.

December 28, 2025
Case Study7 min

Signing in Contested Environments: Lessons from EW and SIGINT

In electronic warfare, devices will be captured. In SIGINT operations, software will be compromised. How military cryptographic requirements led us to design PhoenixSig's recovery model.

December 19, 2025
Technical15 min

TEE as a Trust Anchor: VaultKey Design Patterns

A practical guide to using Trusted Execution Environments as cryptographic trust anchors. Covers Android Keystore, Secure Enclave, Intel SGX, and the tradeoffs between each for non-exportable key storage.

December 10, 2025

Subscribe for new posts on PQC, PCS, and cryptographic engineering.