Oh yes, absolutely. In fact Trezor uses two signature algorithms for their firmwares, pre and post quamtum precisely for the case that the post quatum algo ends being unsafe. Unfortunately I don't remember the details. I hope some of them come and comment. ping @Hynek

Replies (2)

waxwing's avatar
waxwing 1 month ago
Yes that's a very good point. I remember now that DJB is a strong advocate for exactly this. Notice though how in performance critical applications, using even more space and time to do this is going to be ... ouch.