top of page

Search
![[Research] Chinese Quantum Computing Companies — Detailed Industry Analysis, March 2026](https://static.wixstatic.com/media/de513c_c7174a8d1f154a6389491b68d6725191~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/de513c_c7174a8d1f154a6389491b68d6725191~mv2.webp)
![[Research] Chinese Quantum Computing Companies — Detailed Industry Analysis, March 2026](https://static.wixstatic.com/media/de513c_c7174a8d1f154a6389491b68d6725191~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_avif,quality_auto/de513c_c7174a8d1f154a6389491b68d6725191~mv2.webp)
[Research] Chinese Quantum Computing Companies — Detailed Industry Analysis, March 2026
10,000+ km QKD fiber network — 145 nodes, 17 provinces, 80 cities
Zuchongzhi-3 — 105 qubits, 10¹⁵× faster than classical supercomputers
Tianyan-504 — 504-qubit Xiaohong chip, China's domestic qubit record
Jinan-1 — 12,900km satellite QKD, quantum-encrypted 5G calls (March 2025)
CIQTEK — STAR Market IPO at ¥11.7B, diamond NV quantum sensing
China's model is structurally different: state telcos (China Telecom, China Mobile) operate quantum cloud as national infrastructure, not
1 day ago
![[Research] Enhancing Cyber Security with Post-Quantum Cryptography: An Empirical Validation and Practical Application](https://static.wixstatic.com/media/de513c_595963cb52cb4f898ed6a0ef16df0494~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/de513c_595963cb52cb4f898ed6a0ef16df0494~mv2.webp)
![[Research] Enhancing Cyber Security with Post-Quantum Cryptography: An Empirical Validation and Practical Application](https://static.wixstatic.com/media/de513c_595963cb52cb4f898ed6a0ef16df0494~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_avif,quality_auto/de513c_595963cb52cb4f898ed6a0ef16df0494~mv2.webp)
[Research] Enhancing Cyber Security with Post-Quantum Cryptography: An Empirical Validation and Practical Application
This paper empirically validates the theoretical frameworks presented in "A Quantum Technology Adoption Framework" [2] and "Why QRNG Confuses PQC" [3]. We conducted a series of file encryption and decryption experiments using NIST-standardized Post-Quantum Cryptography (PQC) algorithms on a defined dataset of PDF and large-scale video files. The performance metrics, including speed and throughput for various KEM and digital signature algorithms (ML-KEM, ML-DSA, Falcon, SPHINC
Jan 28
bottom of page