Significant attack on post-quantum signature Dilithium published before Nov 2026
Mini
1
Ṁ202026
34%
chance
1D
1W
1M
ALL
Resolves Yes, if, before November 2026, an attack on quantum or conventional computer of the signature scheme Dilithium (1) is published (preprint, journal article or conference proceeding), that leads to NIST dropping the algorithm from its post-quantum standard, or discouraging its use; or alternatively, if multiple recognized/leading cryptographers recommend against its use.
I reserve the right to discuss in the comments, temporarily halt trading, and possibly even resolve N/A on ambiguity. Suggestions and comments on resolution criteria are welcome if made well in advance of the resolving event
Get
1,000
and1.00
Related questions
Related questions
Significant attack on post-quantum signature FALCON published before Nov 2026
41% chance
Significant attack on post-quantum KEM Kyber published before Nov 2026
53% chance
Significant attack on post-quantum signature SPHINCS+ published before Nov 2026
10% chance
Will a plausible post-quantum proof obfuscator be found by end of 2024?
30% chance
Will Quantum computing break RSA encryption before 2030?
34% chance
SHA-256 broken by quantum computer before 2030
43% chance
Will quantum computers, or any other type of computer, be able to crack bitcoin's ECDSA signatures before 2050?
24% chance
Will a quantum computer factor a 6-bit number before 2026?
44% chance
Will quantum computing break cybersecurity by 2030?
19% chance
Did the NSA work to weaken post-quantum cryptography?
60% chance