<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url><loc>https://blog.projecteleven.com</loc></url>
<url><loc>https://blog.projecteleven.com/bulletins</loc></url>
<url><loc>https://blog.projecteleven.com/posts</loc></url>
<url><loc>https://blog.projecteleven.com/posts/a-look-at-post-quantum-proposals-for-bitcoin</loc></url>
<url><loc>https://blog.projecteleven.com/posts/announcing-ml-dsa-b-optimizing-post-quantum-signatures-with-blake3</loc></url>
<url><loc>https://blog.projecteleven.com/posts/announcing-our-6m-seed-round-to-build-a-quantum-ready-future</loc></url>
<url><loc>https://blog.projecteleven.com/posts/announcing-project-elevens-series-a</loc></url>
<url><loc>https://blog.projecteleven.com/posts/are-emerging-pq-signature-schemes-better-for-blockchains</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-1--hello-world</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-10--stable-coins-and-the-yellowpages</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-11--from-whales-to-quantum-waves</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-12--sunsetting-signatures-and-cracking-keys</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-13--roadmaps-superpositions--quantum-safe-wallets</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-14--arc-and-the-seeds-of-quantum-security</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-15--ethereums-quantum-attack-vectors--ecdlp-challeng</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-16--quantum-readiness-from-regulation-to-repos</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-17--measuring-progress-from-tiny-keys-to-giant-primitives</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-18--quantum-advantage-post-quantum-readiness-and-the-road-to-q-day</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-19--quantum-advantages-echo-dynamic-error-improvements-and-new-collaborations</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-2--battle-of-the-hyperscalers-</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-20--quantum-snubs-memory-overhead-reduction-and-a-new-quantum-hub</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-3--pqc</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-4--decisions-decisions</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-5--testing-for-strength</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-6--10-misconceptions</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-7--pq-signatures</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-8--dxdt</loc></url>
<url><loc>https://blog.projecteleven.com/posts/bulletin-9--wargames</loc></url>
<url><loc>https://blog.projecteleven.com/posts/countdown-to-q-day-part-1</loc></url>
<url><loc>https://blog.projecteleven.com/posts/countdown-to-q-day-part-2---quantum-error-correction</loc></url>
<url><loc>https://blog.projecteleven.com/posts/countdown-to-q-day-part-3---logical-qubits</loc></url>
<url><loc>https://blog.projecteleven.com/posts/erc-4337-entrypoint-v09-fixing-a-griefing-vector-in-account-abstraction</loc></url>
<url><loc>https://blog.projecteleven.com/posts/generating-post-quantum-keypairs-from-a-single-24word-seed-phrase</loc></url>
<url><loc>https://blog.projecteleven.com/posts/guaranteeing-post-quantum-encryption-in-the-browser-ml-kem-over-websockets</loc></url>
<url><loc>https://blog.projecteleven.com/posts/hd-wallets--quantum-risk-does-reusing-one-address-endanger-the-rest</loc></url>
<url><loc>https://blog.projecteleven.com/posts/hello-yellowpages</loc></url>
<url><loc>https://blog.projecteleven.com/posts/introducing-dep-doc---a-linting-and-documentation-tool-for-dependency-management</loc></url>
<url><loc>https://blog.projecteleven.com/posts/introducing-pq-addresses</loc></url>
<url><loc>https://blog.projecteleven.com/posts/is-your-browser-quantum-safe</loc></url>
<url><loc>https://blog.projecteleven.com/posts/post-quantum-digital-signatures--the-lattice-city---what-is-a-lattice-and-how-does-ml-dsa-work</loc></url>
<url><loc>https://blog.projecteleven.com/posts/post-quantum-readiness-for-eddsa-chains-and-a-possible-solution-for-some-ecdsa-wallets---part-1</loc></url>
<url><loc>https://blog.projecteleven.com/posts/post-quantum-readiness-for-eddsa-chains-and-a-possible-solution-for-some-ecdsa-wallets---part-2</loc></url>
<url><loc>https://blog.projecteleven.com/posts/pq-implementation-vulnerabilities-volume-1-a-rustcrypto-side-channel-cve</loc></url>
<url><loc>https://blog.projecteleven.com/posts/project-eleven-raises-20m-to-prepare-digital-asset-infrastructure-for-the-quantum-era</loc></url>
<url><loc>https://blog.projecteleven.com/posts/project-eleven-to-advance-post-quantum-security-for-the-solana-network</loc></url>
<url><loc>https://blog.projecteleven.com/posts/project-eleven-welcomes-dolev-bluvstein-as-an-advisor</loc></url>
<url><loc>https://blog.projecteleven.com/posts/project-eleven-welcomes-graeme-moore-as-head-of-strategy</loc></url>
<url><loc>https://blog.projecteleven.com/posts/project-eleven-welcomes-michael-gronager-as-an-advisor</loc></url>
<url><loc>https://blog.projecteleven.com/posts/project-eleven-welcomes-post-quantum-cryptography-researcher-dr-doruk-gr-as-first-grant-recipient</loc></url>
<url><loc>https://blog.projecteleven.com/posts/project-eleven-welcomes-richard-crosby-as-lead-engineer</loc></url>
<url><loc>https://blog.projecteleven.com/posts/quantum-attack-vectors-in-ethereum</loc></url>
<url><loc>https://blog.projecteleven.com/posts/quantum-earthquakes-crypto-foundations</loc></url>
<url><loc>https://blog.projecteleven.com/posts/quantum-vs-usdc-a-threat-analysis-of-circles-smart-contract</loc></url>
<url><loc>https://blog.projecteleven.com/posts/quantum-vulnerability-of-bitcoin-addresses</loc></url>
<url><loc>https://blog.projecteleven.com/posts/quantum-wargames</loc></url>
<url><loc>https://blog.projecteleven.com/posts/rsa</loc></url>
<url><loc>https://blog.projecteleven.com/posts/shors-algorithm-for-discrete-logs</loc></url>
<url><loc>https://blog.projecteleven.com/posts/surprises-while-verifying-post-quantum-signatures-on-a-macbook</loc></url>
<url><loc>https://blog.projecteleven.com/posts/tee-attestation-from-the-browser</loc></url>
<url><loc>https://blog.projecteleven.com/posts/the-risk-of-quantum-to-classical-cryptography</loc></url>
<url><loc>https://blog.projecteleven.com/posts/the-state-of-post-quantum-cryptography-in-rust-the-belt-is-vacant</loc></url>
<url><loc>https://blog.projecteleven.com/posts/the-trust-model-of-yellowpages-v1</loc></url>
<url><loc>https://blog.projecteleven.com/posts/top-10-quantum-meets-blockchain-myths</loc></url>
<url><loc>https://blog.projecteleven.com/posts/tracking-quantum-vulnerable-bitcoin---part-1</loc></url>
<url><loc>https://blog.projecteleven.com/posts/tracking-quantum-vulnerable-bitcoin---part-2</loc></url>
<url><loc>https://blog.projecteleven.com/posts/verification-key--public-key</loc></url>
<url><loc>https://blog.projecteleven.com/posts/vulnerabilities-of-stablecoins-to-quantum-attacks</loc></url>
<url><loc>https://blog.projecteleven.com/posts/what-is-quantum-computing</loc></url>
</urlset>