Get the latest tech news
NSA and IETF: Can an attacker purchase standardization of weakened cryptography?
's normal for post-quantum cryptography to be rolled out as an extra layer of security on top of traditional pre-quantum cryptography, rather than as a replacement. For example, Google's CECPQ1 experiment was double encryption with traditional pre-quantum ECC (specifically X25519) and post-quantum NewHope1024.
None
Or read this on Hacker News