• Monster Train 2 review: Hell will freeze over before we're done playing

    Monster Train 2 is a superlative sequel that takes everything that made the first game great and amps it up with smart new systems and even more replayability - here are our thoughtsTech17:09, 27 May 2025Ready to get back on the track?There’s nothing quite like a good roguelike deckbuilder . Whether you’re into Slay The Spire, Inscryption, or Monster Train, you’re not short of options either.So, how does a studio brute force its way into the conversation? By dropping not only a sequel to one of the aforementioned holy trinity , but also by making it possibly the best example of the card-based genre in years.‌Monster Train 2 is that rare sequel that expertly weaves new ideas into the fine-tuned locomotive engine of its predecessor, all while keeping many of the original parts. The result is one of the most moreish games of 2025, and even the last half-decade.‌This time, we're working upwardMonster Train debuted back in 2020, and its appeal came from its much more expansive art style than its contemporary, Slay The Spire’s simpler art direction, as well as the fact that its ludicrously-addictive card-based combat loop works on multiple levels.Racking up the units to protect the top tier of your train added an element of positioning and a layer of tactility to combat, while also providing foes with an opportunity to outplay you.Article continues belowThankfully, Monster Train 2 doesn’t so much change that system as it buffs it to a shine while adding a whole host of small tweaks around it.There's a seemingly infinite amount of build diversityThis time around, your train isn’t headed for hell, but is instead sent speeding into the heavens as you plot your route and pick your battles, unlocking cards as you go and using them to see how long you can keep your violent voyage going.‌That simple change of direction from the deepest depths to the highest heights means you can now pick your crew from angels, demons, and everything in between, and it’s all done with just as much charmthan it was in the first game.Enemies arrive, and you funnel them through your train while protecting the heart of the engine with card-based attacks that you level up and collect over the course of a run. Do you go all out to protect the top level, or aim to wear down the foes at the base level first? Cards can be played on multiple levels, and that means there’s much more choice at play than in similar titles.It may look like Monster Train 1, but there's more going on‌With cards to play, units to assemble, and many of them having unique interactions, it’ll be a long, long time before you’ve seen everything Monster Train 2 has to offer, which will be mana from heaven for anyone still logging into the first game five years after its launch.That’s before we get into more complex systems, too, like which items to grab and when, or whether your equipment cards are best served to power up your own cleaving commuters, or to be dropped onto your foes to debuff them.With primary and secondary factions to choose from, each with their own starting units and customisation options, Monster Train 2 is the kind of game one could feasibly start playing at 9 AM and keep chipping away at until the small hours of the next day. In fact, that’s exactly what happened more than once in my playtime, especially since it’s a model citizen on the Steam Deck.‌We won't spoil the surprise, but the clan variety is amazingWant to hoard gold to be able to splurge on reinforcements? The dragons are your best shout, but you can also use the Underlegion to essentially outnumber your foes with the power of, um, fungus.The Lazarus League, on the other hand, are like a hand grenade that’s just as liable to go off in your hand as it is to do damage to your opponents, bringing units back to life with randomised bonuses that can make or break a run.‌Mixing a pair of these factions together and attempting to essentially break the game’s carefully measured combat system with a mix of random card additions, buffs, and plain old luck is a rush that saw me racking up the runs night after night.Then there’s Endless Mode, which lets you take your custom deck from a winning run and keep testing it. In essence, you just keep going, battling until your Pyre Heart goes out, but with positive and negative modifiers to keep adding more and more layers to its delicious mix of mechanics.The VerdictArticle continues belowMonster Train 2 is a game that will sap your free time if you let it, and if you have a Steam Deck, we’d give it a 6 out of 5 if we could.It really is that good, that addictive, and that fun that we may struggle to go back to the incredible original–high praise, indeed.Reviewed on PC. Review code provided by the publisher.‌‌‌
    #monster #train #review #hell #will
    Monster Train 2 review: Hell will freeze over before we're done playing
    Monster Train 2 is a superlative sequel that takes everything that made the first game great and amps it up with smart new systems and even more replayability - here are our thoughtsTech17:09, 27 May 2025Ready to get back on the track?There’s nothing quite like a good roguelike deckbuilder . Whether you’re into Slay The Spire, Inscryption, or Monster Train, you’re not short of options either.So, how does a studio brute force its way into the conversation? By dropping not only a sequel to one of the aforementioned holy trinity , but also by making it possibly the best example of the card-based genre in years.‌Monster Train 2 is that rare sequel that expertly weaves new ideas into the fine-tuned locomotive engine of its predecessor, all while keeping many of the original parts. The result is one of the most moreish games of 2025, and even the last half-decade.‌This time, we're working upwardMonster Train debuted back in 2020, and its appeal came from its much more expansive art style than its contemporary, Slay The Spire’s simpler art direction, as well as the fact that its ludicrously-addictive card-based combat loop works on multiple levels.Racking up the units to protect the top tier of your train added an element of positioning and a layer of tactility to combat, while also providing foes with an opportunity to outplay you.Article continues belowThankfully, Monster Train 2 doesn’t so much change that system as it buffs it to a shine while adding a whole host of small tweaks around it.There's a seemingly infinite amount of build diversityThis time around, your train isn’t headed for hell, but is instead sent speeding into the heavens as you plot your route and pick your battles, unlocking cards as you go and using them to see how long you can keep your violent voyage going.‌That simple change of direction from the deepest depths to the highest heights means you can now pick your crew from angels, demons, and everything in between, and it’s all done with just as much charmthan it was in the first game.Enemies arrive, and you funnel them through your train while protecting the heart of the engine with card-based attacks that you level up and collect over the course of a run. Do you go all out to protect the top level, or aim to wear down the foes at the base level first? Cards can be played on multiple levels, and that means there’s much more choice at play than in similar titles.It may look like Monster Train 1, but there's more going on‌With cards to play, units to assemble, and many of them having unique interactions, it’ll be a long, long time before you’ve seen everything Monster Train 2 has to offer, which will be mana from heaven for anyone still logging into the first game five years after its launch.That’s before we get into more complex systems, too, like which items to grab and when, or whether your equipment cards are best served to power up your own cleaving commuters, or to be dropped onto your foes to debuff them.With primary and secondary factions to choose from, each with their own starting units and customisation options, Monster Train 2 is the kind of game one could feasibly start playing at 9 AM and keep chipping away at until the small hours of the next day. In fact, that’s exactly what happened more than once in my playtime, especially since it’s a model citizen on the Steam Deck.‌We won't spoil the surprise, but the clan variety is amazingWant to hoard gold to be able to splurge on reinforcements? The dragons are your best shout, but you can also use the Underlegion to essentially outnumber your foes with the power of, um, fungus.The Lazarus League, on the other hand, are like a hand grenade that’s just as liable to go off in your hand as it is to do damage to your opponents, bringing units back to life with randomised bonuses that can make or break a run.‌Mixing a pair of these factions together and attempting to essentially break the game’s carefully measured combat system with a mix of random card additions, buffs, and plain old luck is a rush that saw me racking up the runs night after night.Then there’s Endless Mode, which lets you take your custom deck from a winning run and keep testing it. In essence, you just keep going, battling until your Pyre Heart goes out, but with positive and negative modifiers to keep adding more and more layers to its delicious mix of mechanics.The VerdictArticle continues belowMonster Train 2 is a game that will sap your free time if you let it, and if you have a Steam Deck, we’d give it a 6 out of 5 if we could.It really is that good, that addictive, and that fun that we may struggle to go back to the incredible original–high praise, indeed.Reviewed on PC. Review code provided by the publisher.‌‌‌ #monster #train #review #hell #will
    Monster Train 2 review: Hell will freeze over before we're done playing
    www.dailystar.co.uk
    Monster Train 2 is a superlative sequel that takes everything that made the first game great and amps it up with smart new systems and even more replayability - here are our thoughtsTech17:09, 27 May 2025Ready to get back on the track?There’s nothing quite like a good roguelike deckbuilder . Whether you’re into Slay The Spire, Inscryption, or Monster Train, you’re not short of options either.So, how does a studio brute force its way into the conversation? By dropping not only a sequel to one of the aforementioned holy trinity , but also by making it possibly the best example of the card-based genre in years.‌Monster Train 2 is that rare sequel that expertly weaves new ideas into the fine-tuned locomotive engine of its predecessor, all while keeping many of the original parts. The result is one of the most moreish games of 2025, and even the last half-decade.‌This time, we're working upwardMonster Train debuted back in 2020, and its appeal came from its much more expansive art style than its contemporary, Slay The Spire’s simpler art direction, as well as the fact that its ludicrously-addictive card-based combat loop works on multiple levels (literally).Racking up the units to protect the top tier of your train added an element of positioning and a layer of tactility to combat, while also providing foes with an opportunity to outplay you.Article continues belowThankfully, Monster Train 2 doesn’t so much change that system as it buffs it to a shine while adding a whole host of small tweaks around it.There's a seemingly infinite amount of build diversityThis time around, your train isn’t headed for hell, but is instead sent speeding into the heavens as you plot your route and pick your battles, unlocking cards as you go and using them to see how long you can keep your violent voyage going.‌That simple change of direction from the deepest depths to the highest heights means you can now pick your crew from angels, demons, and everything in between, and it’s all done with just as much charm (and a little more character) than it was in the first game.Enemies arrive, and you funnel them through your train while protecting the heart of the engine with card-based attacks that you level up and collect over the course of a run. Do you go all out to protect the top level, or aim to wear down the foes at the base level first? Cards can be played on multiple levels, and that means there’s much more choice at play than in similar titles.It may look like Monster Train 1, but there's more going on‌With cards to play, units to assemble, and many of them having unique interactions, it’ll be a long, long time before you’ve seen everything Monster Train 2 has to offer, which will be mana from heaven for anyone still logging into the first game five years after its launch.That’s before we get into more complex systems, too, like which items to grab and when, or whether your equipment cards are best served to power up your own cleaving commuters, or to be dropped onto your foes to debuff them.With primary and secondary factions to choose from, each with their own starting units and customisation options, Monster Train 2 is the kind of game one could feasibly start playing at 9 AM and keep chipping away at until the small hours of the next day. In fact, that’s exactly what happened more than once in my playtime, especially since it’s a model citizen on the Steam Deck.‌We won't spoil the surprise, but the clan variety is amazingWant to hoard gold to be able to splurge on reinforcements? The dragons are your best shout, but you can also use the Underlegion to essentially outnumber your foes with the power of, um, fungus.The Lazarus League, on the other hand, are like a hand grenade that’s just as liable to go off in your hand as it is to do damage to your opponents, bringing units back to life with randomised bonuses that can make or break a run.‌Mixing a pair of these factions together and attempting to essentially break the game’s carefully measured combat system with a mix of random card additions, buffs, and plain old luck is a rush that saw me racking up the runs night after night.Then there’s Endless Mode, which lets you take your custom deck from a winning run and keep testing it. In essence, you just keep going, battling until your Pyre Heart goes out, but with positive and negative modifiers to keep adding more and more layers to its delicious mix of mechanics.The VerdictArticle continues belowMonster Train 2 is a game that will sap your free time if you let it, and if you have a Steam Deck, we’d give it a 6 out of 5 if we could.It really is that good, that addictive, and that fun that we may struggle to go back to the incredible original–high praise, indeed.Reviewed on PC. Review code provided by the publisher.‌‌‌
    0 Comentários ·0 Compartilhamentos ·0 Anterior
  • Nintendo Switch 2 is getting an old school midnight launch at major UK toy store

    Nintendo Switch 2 is getting an old school midnight launch at major UK toy store

    Michael Beckwith

    Published May 27, 2025 5:51pm

    Updated May 27, 2025 5:51pm

    A midnight rendezvous at Smyths could nab you a Switch 2If you’re yet to secure a pre-order for the Nintendo Switch 2, you may want to consider attending the console’s only public midnight launch.
    Midnight launch events used to be guaranteed whenever new video games, and especially new gaming consoles, arrived but the whole concept has slowly disappeared over time, along with the shops that used to host them.
    This is because people are buying fewer physical games than they used to, as well as the decline of local high street shopping in general – something the lockdown-inducing coronavirus pandemic only accelerated.
    As such, it seems like very few people will be camping outside their local gaming shops to be among the first to grab a Nintendo Switch 2 next week, although one retailer is keeping the dream alive with a country-wide midnight launch.
    The retailer in question is Smyths, which already offers online and in-store Switch 2 pre-orders. Unsurprisingly, it’s sold out at the moment, but the idea is that there’ll be more stock in for the countrywide midnight launch events.
    According to its own website, all Smyth stores in the UK will have a limited selection of Switch 2 stock to purchase from 12:01am until 12:30am on June 5.
    If you’ve already pre-ordered for Click & Collect or In-Store Collection, you can pick yours up during the midnight launch too, but you must have photo ID with you.
    Be sure to use Smyth’s store tracker to check if there’s one near where you live or at least within reasonable driving distance if you’re interested in taking part.
    Smyths has also scheduled a separate launch event that’ll run from 11:30pm on June 4 until 12:30am on June 5, where you can play a Mario Kart World demo and, if you’re among the first 100 attendees, claim free Nintendo themed goodies.
    This is only happening at a small selection of stores, though, at the following locations:

    Belfast
    Glasgow
    Hull
    Romford
    Stockport

    At the time of writing, there’s no mention of any other retailers offering similar events, at least in the UK. US retailers Best Buy and GameStop will open at midnight for people to buy a Switch 2, but that seems to be it.

    More Trending

    Aside from a couple of YouTubers who aim to be the first to step into the Nintendo Stores in the US once the Switch 2 launches, we’ve yet to see much evidence of anyone camping outside shops. At least not to the degree of past console launches.
    This reinforces the idea that nowadays most people prefer to sit at home and wait for a guaranteed pre-order. That said, pre-orders have been frequently selling out since they went live, with the console so popular that Japan has already run out, prompting an apology from Nintendo.
    Unless you’re able to secure a pre-order within the next week, being first in line at Smyths may be your best shot at grabbing a Switch 2. Hopefully, things won’t get too rowdy.

    Are you willing to stay up till midnight to grab a Switch 2?Email gamecentral@metro.co.uk, leave a comment below, follow us on Twitter, and sign-up to our newsletter.
    To submit Inbox letters and Reader’s Features more easily, without the need to send an email, just use our Submit Stuff page here.
    For more stories like this, check our Gaming page.

    GameCentral
    Sign up for exclusive analysis, latest releases, and bonus community content.
    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    #nintendo #switch #getting #old #school
    Nintendo Switch 2 is getting an old school midnight launch at major UK toy store
    Nintendo Switch 2 is getting an old school midnight launch at major UK toy store Michael Beckwith Published May 27, 2025 5:51pm Updated May 27, 2025 5:51pm A midnight rendezvous at Smyths could nab you a Switch 2If you’re yet to secure a pre-order for the Nintendo Switch 2, you may want to consider attending the console’s only public midnight launch. Midnight launch events used to be guaranteed whenever new video games, and especially new gaming consoles, arrived but the whole concept has slowly disappeared over time, along with the shops that used to host them. This is because people are buying fewer physical games than they used to, as well as the decline of local high street shopping in general – something the lockdown-inducing coronavirus pandemic only accelerated. As such, it seems like very few people will be camping outside their local gaming shops to be among the first to grab a Nintendo Switch 2 next week, although one retailer is keeping the dream alive with a country-wide midnight launch. The retailer in question is Smyths, which already offers online and in-store Switch 2 pre-orders. Unsurprisingly, it’s sold out at the moment, but the idea is that there’ll be more stock in for the countrywide midnight launch events. According to its own website, all Smyth stores in the UK will have a limited selection of Switch 2 stock to purchase from 12:01am until 12:30am on June 5. If you’ve already pre-ordered for Click & Collect or In-Store Collection, you can pick yours up during the midnight launch too, but you must have photo ID with you. Be sure to use Smyth’s store tracker to check if there’s one near where you live or at least within reasonable driving distance if you’re interested in taking part. Smyths has also scheduled a separate launch event that’ll run from 11:30pm on June 4 until 12:30am on June 5, where you can play a Mario Kart World demo and, if you’re among the first 100 attendees, claim free Nintendo themed goodies. This is only happening at a small selection of stores, though, at the following locations: Belfast Glasgow Hull Romford Stockport At the time of writing, there’s no mention of any other retailers offering similar events, at least in the UK. US retailers Best Buy and GameStop will open at midnight for people to buy a Switch 2, but that seems to be it. More Trending Aside from a couple of YouTubers who aim to be the first to step into the Nintendo Stores in the US once the Switch 2 launches, we’ve yet to see much evidence of anyone camping outside shops. At least not to the degree of past console launches. This reinforces the idea that nowadays most people prefer to sit at home and wait for a guaranteed pre-order. That said, pre-orders have been frequently selling out since they went live, with the console so popular that Japan has already run out, prompting an apology from Nintendo. Unless you’re able to secure a pre-order within the next week, being first in line at Smyths may be your best shot at grabbing a Switch 2. Hopefully, things won’t get too rowdy. Are you willing to stay up till midnight to grab a Switch 2?Email gamecentral@metro.co.uk, leave a comment below, follow us on Twitter, and sign-up to our newsletter. To submit Inbox letters and Reader’s Features more easily, without the need to send an email, just use our Submit Stuff page here. For more stories like this, check our Gaming page. GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy #nintendo #switch #getting #old #school
    Nintendo Switch 2 is getting an old school midnight launch at major UK toy store
    metro.co.uk
    Nintendo Switch 2 is getting an old school midnight launch at major UK toy store Michael Beckwith Published May 27, 2025 5:51pm Updated May 27, 2025 5:51pm A midnight rendezvous at Smyths could nab you a Switch 2 (Nintendo) If you’re yet to secure a pre-order for the Nintendo Switch 2, you may want to consider attending the console’s only public midnight launch. Midnight launch events used to be guaranteed whenever new video games, and especially new gaming consoles, arrived but the whole concept has slowly disappeared over time, along with the shops that used to host them. This is because people are buying fewer physical games than they used to, as well as the decline of local high street shopping in general – something the lockdown-inducing coronavirus pandemic only accelerated. As such, it seems like very few people will be camping outside their local gaming shops to be among the first to grab a Nintendo Switch 2 next week, although one retailer is keeping the dream alive with a country-wide midnight launch. The retailer in question is Smyths, which already offers online and in-store Switch 2 pre-orders. Unsurprisingly, it’s sold out at the moment, but the idea is that there’ll be more stock in for the countrywide midnight launch events. According to its own website, all Smyth stores in the UK will have a limited selection of Switch 2 stock to purchase from 12:01am until 12:30am on June 5. If you’ve already pre-ordered for Click & Collect or In-Store Collection, you can pick yours up during the midnight launch too, but you must have photo ID with you. Be sure to use Smyth’s store tracker to check if there’s one near where you live or at least within reasonable driving distance if you’re interested in taking part. Smyths has also scheduled a separate launch event that’ll run from 11:30pm on June 4 until 12:30am on June 5, where you can play a Mario Kart World demo and, if you’re among the first 100 attendees, claim free Nintendo themed goodies. This is only happening at a small selection of stores, though, at the following locations: Belfast Glasgow Hull Romford Stockport At the time of writing, there’s no mention of any other retailers offering similar events, at least in the UK. US retailers Best Buy and GameStop will open at midnight for people to buy a Switch 2, but that seems to be it. More Trending Aside from a couple of YouTubers who aim to be the first to step into the Nintendo Stores in the US once the Switch 2 launches, we’ve yet to see much evidence of anyone camping outside shops. At least not to the degree of past console launches. This reinforces the idea that nowadays most people prefer to sit at home and wait for a guaranteed pre-order. That said, pre-orders have been frequently selling out since they went live, with the console so popular that Japan has already run out, prompting an apology from Nintendo. Unless you’re able to secure a pre-order within the next week, being first in line at Smyths may be your best shot at grabbing a Switch 2. Hopefully, things won’t get too rowdy. Are you willing to stay up till midnight to grab a Switch 2? (Smyths) Email gamecentral@metro.co.uk, leave a comment below, follow us on Twitter, and sign-up to our newsletter. To submit Inbox letters and Reader’s Features more easily, without the need to send an email, just use our Submit Stuff page here. For more stories like this, check our Gaming page. GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    0 Comentários ·0 Compartilhamentos ·0 Anterior
  • Amazon Slashes Price on New 25,000mAh Laptop Power Bank After Memorial Day, No Mercy for Anker

    When it comes to portable power banks, there’s no shortage of options on the market but as anyone who’s ever been let down by a cheap charger knows, not all brands are created equal. Reliability is everything when you’re counting on a power bank to keep your essential devices running. Famous for its dependability, safety features, and technology, Anker has become the go-to brand for this.

    Right now, Amazon has an amazing sale going on the latest Anker laptop power bank that makes it one of the season’s best picks. This model comes with a massive 25,000mAh capacityand it was recently released. It already has more than 1,000 five-star reviews and has been praised by many as the best power bank on the market. Even more incredible is the cost these days: now you can have it for just a discount from its original price tag.
    See 100W Output
    With three USB-C ports for as much as 100W output, you are able to charge your MacBook, phone, tablet, and so on—all at once. That is, no more messing about with devices or waiting for the first to finish charging before charging a second. The total 25,000mAh capacity is enough for long car rides, busy workdays or just plain peace of mind at home. And with its amazingly fast recharging capability, you can charge the bank itself to 30% in just 20 minutes.

    The power bank comes with two internal USB-C cables – one extendable to 2.3 feetand a shorter cable that is also a tough-carry strap. That way you do not have to worry about misplacing your cables or dealing with tangled wires and it is best to use on the move, when commuting or just keep in your backpack for emergencies. The device is designed to charge up to four devices at once thanks to its combination of USB-C and USB-A ports. Anker backs its product with an 18-month warranty and responsive customer support for you extra peace of mind with your purchase.
    This 2024 Anker laptop power bank is an essential if you relay on your devices throughout the day. Don’t miss this unique chance to own the greatest in the industry for one of the lowest prices ever.
    See
    #amazon #slashes #price #new #25000mah
    Amazon Slashes Price on New 25,000mAh Laptop Power Bank After Memorial Day, No Mercy for Anker
    When it comes to portable power banks, there’s no shortage of options on the market but as anyone who’s ever been let down by a cheap charger knows, not all brands are created equal. Reliability is everything when you’re counting on a power bank to keep your essential devices running. Famous for its dependability, safety features, and technology, Anker has become the go-to brand for this. Right now, Amazon has an amazing sale going on the latest Anker laptop power bank that makes it one of the season’s best picks. This model comes with a massive 25,000mAh capacityand it was recently released. It already has more than 1,000 five-star reviews and has been praised by many as the best power bank on the market. Even more incredible is the cost these days: now you can have it for just a discount from its original price tag. See 100W Output With three USB-C ports for as much as 100W output, you are able to charge your MacBook, phone, tablet, and so on—all at once. That is, no more messing about with devices or waiting for the first to finish charging before charging a second. The total 25,000mAh capacity is enough for long car rides, busy workdays or just plain peace of mind at home. And with its amazingly fast recharging capability, you can charge the bank itself to 30% in just 20 minutes. The power bank comes with two internal USB-C cables – one extendable to 2.3 feetand a shorter cable that is also a tough-carry strap. That way you do not have to worry about misplacing your cables or dealing with tangled wires and it is best to use on the move, when commuting or just keep in your backpack for emergencies. The device is designed to charge up to four devices at once thanks to its combination of USB-C and USB-A ports. Anker backs its product with an 18-month warranty and responsive customer support for you extra peace of mind with your purchase. This 2024 Anker laptop power bank is an essential if you relay on your devices throughout the day. Don’t miss this unique chance to own the greatest in the industry for one of the lowest prices ever. See #amazon #slashes #price #new #25000mah
    Amazon Slashes Price on New 25,000mAh Laptop Power Bank After Memorial Day, No Mercy for Anker
    gizmodo.com
    When it comes to portable power banks, there’s no shortage of options on the market but as anyone who’s ever been let down by a cheap charger knows, not all brands are created equal. Reliability is everything when you’re counting on a power bank to keep your essential devices running. Famous for its dependability, safety features, and technology, Anker has become the go-to brand for this. Right now, Amazon has an amazing sale going on the latest Anker laptop power bank that makes it one of the season’s best picks. This model comes with a massive 25,000mAh capacity (and 100W output) and it was recently released. It already has more than 1,000 five-star reviews and has been praised by many as the best power bank on the market. Even more incredible is the cost these days: now you can have it for just $109, a discount from its original $134 price tag (19% off). See at Amazon 100W Output With three USB-C ports for as much as 100W output, you are able to charge your MacBook, phone, tablet, and so on—all at once. That is, no more messing about with devices or waiting for the first to finish charging before charging a second. The total 25,000mAh capacity is enough for long car rides, busy workdays or just plain peace of mind at home. And with its amazingly fast recharging capability, you can charge the bank itself to 30% in just 20 minutes. The power bank comes with two internal USB-C cables – one extendable to 2.3 feet (proofed for over 20,000 extensions) and a shorter cable that is also a tough-carry strap (proofed for over 20,000 bends). That way you do not have to worry about misplacing your cables or dealing with tangled wires and it is best to use on the move, when commuting or just keep in your backpack for emergencies. The device is designed to charge up to four devices at once thanks to its combination of USB-C and USB-A ports. Anker backs its product with an 18-month warranty and responsive customer support for you extra peace of mind with your purchase. This 2024 Anker laptop power bank is an essential if you relay on your devices throughout the day. Don’t miss this unique chance to own the greatest in the industry for one of the lowest prices ever. See at Amazon
    0 Comentários ·0 Compartilhamentos ·0 Anterior
  • Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena Männa

    Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena MännaSave this picture!© Joosep KivimäePavilion•Venezia, Italy

    Architects:

    Year
    Completion year of this architecture project

    Year: 

    2025

    Photographs

    Photographs:Joosep KivimäeMore SpecsLess Specs
    this picture!
    Text description provided by the architects. The Ministry of Culture of Estonia presents the installation and exhibition "Let me warm you" www.letmewarmyou.com curated by architects Keiti Lige, Elina Liiva, and Helena Männa, the Pavilion of Estonia at the 19th International Architecture Exhibition of La Biennale di Venezia. The Pavilion explores whether current insulation-driven renovations are merely a compliance measure to meet European energy targets or if they can serve as an opportunity to enhance the spatial and social quality of mass housing districts. To highlight this issue, the Estonian Pavilion will cover the facade of a Venetian building with insulation panels, the same practice used in Estonia for mass housing. The palazzetto is located in Riva dei Sette Martiri 1611 in the waterfront between Corso Garibaldi and the Giardini, within the Castello neighborhood. On the ground floor of the same building, a room, wrapped in plastic film, will host an exhibition showing how social dynamics within different stakeholders have an effect on spatial solutions.this picture!this picture!this picture!"With this project, we question whether insulation is just a bureaucratic checkbox for meeting EU targets or a real chance to tackle social and spatial challenges. It exposes the clash between bold global ambitions and the everyday realities of people navigating collective decisions." — assert curators Keiti Lige, Elina Liiva, and Helena Männa. In order to cope with climate change, one half of the world is installing ever-thicker insulation layers, while the other half is using increasingly powerful cooling systems. As Europe races toward its transition to climate neutrality by 2050, Estonia has an ambitious goal, pledging to upgrade all the apartment buildings pre-2000 to at least energy efficiency class C. This sweeping renovation effort is part of a larger European movement to modernize aging housing stock in response to the climate crisis. However, insulation should not be treated as a mere quick fix, a 'bandage,' but rather a meaningful upgrade in quality of life. Given the high costs and long-term impact of these renovations, the real challenge is finding a balance between ambitious climate policies and the everyday needs of the people who live in these spaces.this picture!Installations - The installation, mounted directly onto the existing building's façade, will use the same materials and design elements typically found in Estonian renovations. Set against the ornate architecture of Venice, this stark contrast serves as a powerful visual statement. In Estonia, Soviet-era apartment block renovations often proceed with little to no architectural input, reinforcing a problematic disregard for the character and potential of these spaces. By juxtaposing a fiber cement-clad façade with Venice's rich historic fabric, the installation aims to spark a dialogue between inhabitants and architects about the cities and spaces we aspire to live in.this picture!this picture!Exhibition - On the ground floor of the palazzetto, an exhibition will delve into the social forces shaping renovation decisions. In Estonia, where most apartment buildings are privately owned, renovation choices are often driven by financial constraints, leaving little room for spatial improvements beyond insulation. The exhibition spaceitself will be wrapped in plastic film, symbolizing the relentless push for renovation while exposing how technical fixes often overshadow the deeper connections and real needs people have with their homes. At its centre, a model of a Soviet-era housing block brings human interactions to the forefront, using theatrical dialogues and exaggerated spatial outcomes to depict how different relationships and interactions have their impact on space. By shining a light on the complexities of collective living and renovation decisions, the exhibition invites visitors to reflect on the tension between policy-driven energy goals and the lived realities of those affected by them. The exhibition is accompanied by a catalogue that captures the tragicomedy of an apartment building in six scenes. Based on real people's stories, it explores themes ranging from the fear of change to the revitalization of the neighborhood.this picture!The Biennale Architettura 2025 is curated by architect Carlo Ratti under the theme "Intelligens. Naturale. Artificiale. Collettiva.", and will be about the built environment as one of the largest contributors to atmospheric emissions, placing architecture among the main culprits in the degradation of our planet. As the climate crisis accelerates, architects must offer solutions, substantial and non-cosmetic, effective, and quick to achieve. In this sense, the Estonian exhibition responds to Ratti's call for pavilions: "This year's head theme offers good ground to discuss what happens to architecture when the Architect is excluded from the process. Renovation processes that are planned by residents themselves according to their best knowledge provide a good example of how collective intelligence, or lack of it, affects our spatial environment. The Estonian Pavilion gives the message that the architectural quality of the living environment should not be overlooked in renovation processes," explains Johanna Jõekalda, advisor on architecture and design at the Ministry of Culture of Estonia, Commissioner of the Estonian Pavilion. With "Let me warm you", visitors to the Biennale Architettura 2025 will actively engage with the pavilion and the building. By rethinking renovation strategies, Estonia could set an example for Europe: transforming outdated housing not just for energy efficiency, but for a more sustainable and livable future.this picture!

    Project gallerySee allShow less
    Project locationAddress:Venezia, ItalyLocation to be used only as a reference. It could indicate city/country but not exact address.About this officeKeiti LigeOffice•••Elina LiivaOffice•••Helena MännaOffice•••
    MaterialsWoodPlasticMaterials and TagsPublished on May 27, 2025Cite: "Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena Männa" 27 May 2025. ArchDaily. Accessed . < ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否
    You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    #pavilion #estonia #let #warm #you
    Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena Männa
    Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena MännaSave this picture!© Joosep KivimäePavilion•Venezia, Italy Architects: Year Completion year of this architecture project Year:  2025 Photographs Photographs:Joosep KivimäeMore SpecsLess Specs this picture! Text description provided by the architects. The Ministry of Culture of Estonia presents the installation and exhibition "Let me warm you" www.letmewarmyou.com curated by architects Keiti Lige, Elina Liiva, and Helena Männa, the Pavilion of Estonia at the 19th International Architecture Exhibition of La Biennale di Venezia. The Pavilion explores whether current insulation-driven renovations are merely a compliance measure to meet European energy targets or if they can serve as an opportunity to enhance the spatial and social quality of mass housing districts. To highlight this issue, the Estonian Pavilion will cover the facade of a Venetian building with insulation panels, the same practice used in Estonia for mass housing. The palazzetto is located in Riva dei Sette Martiri 1611 in the waterfront between Corso Garibaldi and the Giardini, within the Castello neighborhood. On the ground floor of the same building, a room, wrapped in plastic film, will host an exhibition showing how social dynamics within different stakeholders have an effect on spatial solutions.this picture!this picture!this picture!"With this project, we question whether insulation is just a bureaucratic checkbox for meeting EU targets or a real chance to tackle social and spatial challenges. It exposes the clash between bold global ambitions and the everyday realities of people navigating collective decisions." — assert curators Keiti Lige, Elina Liiva, and Helena Männa. In order to cope with climate change, one half of the world is installing ever-thicker insulation layers, while the other half is using increasingly powerful cooling systems. As Europe races toward its transition to climate neutrality by 2050, Estonia has an ambitious goal, pledging to upgrade all the apartment buildings pre-2000 to at least energy efficiency class C. This sweeping renovation effort is part of a larger European movement to modernize aging housing stock in response to the climate crisis. However, insulation should not be treated as a mere quick fix, a 'bandage,' but rather a meaningful upgrade in quality of life. Given the high costs and long-term impact of these renovations, the real challenge is finding a balance between ambitious climate policies and the everyday needs of the people who live in these spaces.this picture!Installations - The installation, mounted directly onto the existing building's façade, will use the same materials and design elements typically found in Estonian renovations. Set against the ornate architecture of Venice, this stark contrast serves as a powerful visual statement. In Estonia, Soviet-era apartment block renovations often proceed with little to no architectural input, reinforcing a problematic disregard for the character and potential of these spaces. By juxtaposing a fiber cement-clad façade with Venice's rich historic fabric, the installation aims to spark a dialogue between inhabitants and architects about the cities and spaces we aspire to live in.this picture!this picture!Exhibition - On the ground floor of the palazzetto, an exhibition will delve into the social forces shaping renovation decisions. In Estonia, where most apartment buildings are privately owned, renovation choices are often driven by financial constraints, leaving little room for spatial improvements beyond insulation. The exhibition spaceitself will be wrapped in plastic film, symbolizing the relentless push for renovation while exposing how technical fixes often overshadow the deeper connections and real needs people have with their homes. At its centre, a model of a Soviet-era housing block brings human interactions to the forefront, using theatrical dialogues and exaggerated spatial outcomes to depict how different relationships and interactions have their impact on space. By shining a light on the complexities of collective living and renovation decisions, the exhibition invites visitors to reflect on the tension between policy-driven energy goals and the lived realities of those affected by them. The exhibition is accompanied by a catalogue that captures the tragicomedy of an apartment building in six scenes. Based on real people's stories, it explores themes ranging from the fear of change to the revitalization of the neighborhood.this picture!The Biennale Architettura 2025 is curated by architect Carlo Ratti under the theme "Intelligens. Naturale. Artificiale. Collettiva.", and will be about the built environment as one of the largest contributors to atmospheric emissions, placing architecture among the main culprits in the degradation of our planet. As the climate crisis accelerates, architects must offer solutions, substantial and non-cosmetic, effective, and quick to achieve. In this sense, the Estonian exhibition responds to Ratti's call for pavilions: "This year's head theme offers good ground to discuss what happens to architecture when the Architect is excluded from the process. Renovation processes that are planned by residents themselves according to their best knowledge provide a good example of how collective intelligence, or lack of it, affects our spatial environment. The Estonian Pavilion gives the message that the architectural quality of the living environment should not be overlooked in renovation processes," explains Johanna Jõekalda, advisor on architecture and design at the Ministry of Culture of Estonia, Commissioner of the Estonian Pavilion. With "Let me warm you", visitors to the Biennale Architettura 2025 will actively engage with the pavilion and the building. By rethinking renovation strategies, Estonia could set an example for Europe: transforming outdated housing not just for energy efficiency, but for a more sustainable and livable future.this picture! Project gallerySee allShow less Project locationAddress:Venezia, ItalyLocation to be used only as a reference. It could indicate city/country but not exact address.About this officeKeiti LigeOffice•••Elina LiivaOffice•••Helena MännaOffice••• MaterialsWoodPlasticMaterials and TagsPublished on May 27, 2025Cite: "Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena Männa" 27 May 2025. ArchDaily. Accessed . < ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否 You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream #pavilion #estonia #let #warm #you
    Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena Männa
    www.archdaily.com
    Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena MännaSave this picture!© Joosep KivimäePavilion•Venezia, Italy Architects: Year Completion year of this architecture project Year:  2025 Photographs Photographs:Joosep KivimäeMore SpecsLess Specs Save this picture! Text description provided by the architects. The Ministry of Culture of Estonia presents the installation and exhibition "Let me warm you" www.letmewarmyou.com curated by architects Keiti Lige, Elina Liiva, and Helena Männa, the Pavilion of Estonia at the 19th International Architecture Exhibition of La Biennale di Venezia (May 10th - November 23rd, 2025). The Pavilion explores whether current insulation-driven renovations are merely a compliance measure to meet European energy targets or if they can serve as an opportunity to enhance the spatial and social quality of mass housing districts. To highlight this issue, the Estonian Pavilion will cover the facade of a Venetian building with insulation panels, the same practice used in Estonia for mass housing. The palazzetto is located in Riva dei Sette Martiri 1611 in the waterfront between Corso Garibaldi and the Giardini, within the Castello neighborhood (Address: Riva dei Sette Martiri 1611, Castello, Venice). On the ground floor of the same building, a room, wrapped in plastic film, will host an exhibition showing how social dynamics within different stakeholders have an effect on spatial solutions.Save this picture!Save this picture!Save this picture!"With this project, we question whether insulation is just a bureaucratic checkbox for meeting EU targets or a real chance to tackle social and spatial challenges. It exposes the clash between bold global ambitions and the everyday realities of people navigating collective decisions." — assert curators Keiti Lige, Elina Liiva, and Helena Männa. In order to cope with climate change, one half of the world is installing ever-thicker insulation layers, while the other half is using increasingly powerful cooling systems. As Europe races toward its transition to climate neutrality by 2050, Estonia has an ambitious goal, pledging to upgrade all the apartment buildings pre-2000 to at least energy efficiency class C. This sweeping renovation effort is part of a larger European movement to modernize aging housing stock in response to the climate crisis. However, insulation should not be treated as a mere quick fix, a 'bandage,' but rather a meaningful upgrade in quality of life. Given the high costs and long-term impact of these renovations, the real challenge is finding a balance between ambitious climate policies and the everyday needs of the people who live in these spaces.Save this picture!Installations - The installation, mounted directly onto the existing building's façade, will use the same materials and design elements typically found in Estonian renovations. Set against the ornate architecture of Venice, this stark contrast serves as a powerful visual statement. In Estonia, Soviet-era apartment block renovations often proceed with little to no architectural input, reinforcing a problematic disregard for the character and potential of these spaces. By juxtaposing a fiber cement-clad façade with Venice's rich historic fabric, the installation aims to spark a dialogue between inhabitants and architects about the cities and spaces we aspire to live in.Save this picture!Save this picture!Exhibition - On the ground floor of the palazzetto, an exhibition will delve into the social forces shaping renovation decisions. In Estonia, where most apartment buildings are privately owned, renovation choices are often driven by financial constraints, leaving little room for spatial improvements beyond insulation. The exhibition space (an existing apartment) itself will be wrapped in plastic film, symbolizing the relentless push for renovation while exposing how technical fixes often overshadow the deeper connections and real needs people have with their homes. At its centre, a model of a Soviet-era housing block brings human interactions to the forefront, using theatrical dialogues and exaggerated spatial outcomes to depict how different relationships and interactions have their impact on space. By shining a light on the complexities of collective living and renovation decisions, the exhibition invites visitors to reflect on the tension between policy-driven energy goals and the lived realities of those affected by them. The exhibition is accompanied by a catalogue that captures the tragicomedy of an apartment building in six scenes. Based on real people's stories, it explores themes ranging from the fear of change to the revitalization of the neighborhood.Save this picture!The Biennale Architettura 2025 is curated by architect Carlo Ratti under the theme "Intelligens. Naturale. Artificiale. Collettiva.", and will be about the built environment as one of the largest contributors to atmospheric emissions, placing architecture among the main culprits in the degradation of our planet. As the climate crisis accelerates, architects must offer solutions, substantial and non-cosmetic, effective, and quick to achieve. In this sense, the Estonian exhibition responds to Ratti's call for pavilions: "This year's head theme offers good ground to discuss what happens to architecture when the Architect is excluded from the process. Renovation processes that are planned by residents themselves according to their best knowledge provide a good example of how collective intelligence, or lack of it, affects our spatial environment. The Estonian Pavilion gives the message that the architectural quality of the living environment should not be overlooked in renovation processes," explains Johanna Jõekalda, advisor on architecture and design at the Ministry of Culture of Estonia, Commissioner of the Estonian Pavilion. With "Let me warm you", visitors to the Biennale Architettura 2025 will actively engage with the pavilion and the building. By rethinking renovation strategies, Estonia could set an example for Europe: transforming outdated housing not just for energy efficiency, but for a more sustainable and livable future.Save this picture! Project gallerySee allShow less Project locationAddress:Venezia, ItalyLocation to be used only as a reference. It could indicate city/country but not exact address.About this officeKeiti LigeOffice•••Elina LiivaOffice•••Helena MännaOffice••• MaterialsWoodPlasticMaterials and TagsPublished on May 27, 2025Cite: "Pavilion of Estonia Let Me Warm You Biennale Architettura 2025 / Keiti Lige + Elina Liiva + Helena Männa" 27 May 2025. ArchDaily. Accessed . <https://www.archdaily.com/1030040/pavilion-of-estonia-let-me-warm-you-biennale-architettura-2025-keiti-lige-plus-elina-liiva-plus-helena-manna&gt ISSN 0719-8884Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否 You've started following your first account!Did you know?You'll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my stream
    0 Comentários ·0 Compartilhamentos ·0 Anterior
  • Popping Popcorn in Cinema 4D and Redshift - C4D Tutorial (Free Project)

    Popping Popcorn in Cinema 4D and Redshift – Tutorial and Project File.

    Download Project File Here ➜

    Have a CINEMA 4D Question?
    Ask it below or contact us here:

    Become a CG SHORTCUTS MEMBER and get access to Pro Training, Time-Saving Project Files, Courses, C4D Support & more -

    Now also available on Patreon:

    CG Shortcuts with Dave Bergin - Learn Cinema 4D Faster.

    --------------------------------------------------------------------------------------------------------

    ⬇⬇⬇⬇⬇⬇⬇ Get your FREE REDSHIFT RENDER CHECKLIST & TUTORIAL! ⬇⬇⬇⬇⬇⬇

    Learn how to render faster and smarter every time ➜

    --------------------------------------------------------------------------------------------------------

    Want to learn OCTANE?

    Try our Octane Masterclass - NOW INCLUDED WITH MEMBERSHIP

    Available here ➜

    --------------------------------------------------------------------------------------------------------

    Want to learn REDSHIFT?

    Try our Redshift Masterclass - NOW INCLUDED WITH MEMBERSHIP

    Available here ➜

    ------------------------------------------------------------------------------------------------------------
    We render all of our projects on Drop & Render Farm for Cinema 4D
    - GET €10 RENDER CREDITS HERE ➜
    ------------------------------------------------------------------------------------------------------------

    Get more tutorials and resources on our website!


    Find our courses at CG Shortcuts Courses


    To share your work with the CG Community you can post on the Facebook group, would love to see what you've made with the tutorials! Join here:

    Get More Videos and Free Stuff - Subscribe ➜

    Ask us a question or let me know what you want to see next in the comments section below!

    ▼ FOLLOW US ▼

    Website:

    ❤ Patreon:

    Courses:

    Facebook:

    Instagram:

    X:

    #CGShortcuts #Cinema4D #C4D
    #popping #popcorn #cinema #redshift #c4d
    Popping Popcorn in Cinema 4D and Redshift - C4D Tutorial (Free Project)
    Popping Popcorn in Cinema 4D and Redshift – Tutorial and Project File. ⬇️ Download Project File Here ➜ ❓❓❓Have a CINEMA 4D Question? Ask it below or contact us here: 👉👉👉 Become a CG SHORTCUTS MEMBER and get access to Pro Training, Time-Saving Project Files, Courses, C4D Support & more - Now also available on Patreon: CG Shortcuts with Dave Bergin - Learn Cinema 4D Faster. -------------------------------------------------------------------------------------------------------- ⬇⬇⬇⬇⬇⬇⬇👇 Get your FREE REDSHIFT RENDER CHECKLIST & TUTORIAL! 👇 ⬇⬇⬇⬇⬇⬇ Learn how to render faster and smarter every time ➜ -------------------------------------------------------------------------------------------------------- ⭐Want to learn OCTANE?⭐ Try our Octane Masterclass - NOW INCLUDED WITH MEMBERSHIP ⭐ Available here ➜ -------------------------------------------------------------------------------------------------------- ⭐Want to learn REDSHIFT?⭐ Try our Redshift Masterclass - NOW INCLUDED WITH MEMBERSHIP ⭐ Available here ➜ ------------------------------------------------------------------------------------------------------------ ⭐ We render all of our projects on Drop & Render Farm for Cinema 4D - GET €10 RENDER CREDITS HERE ➜ ------------------------------------------------------------------------------------------------------------ 💻 Get more tutorials and resources on our website! 🎓Find our courses at CG Shortcuts Courses 😃 To share your work with the CG Community you can post on the Facebook group, would love to see what you've made with the tutorials! Join here: 👉 Get More Videos and Free Stuff - Subscribe ➜ Ask us a question or let me know what you want to see next in the comments section below! ▼ FOLLOW US ▼ ⭐ Website: ❤ Patreon: 🎓 Courses: 😃 Facebook: 📸 Instagram: ❌ X: #CGShortcuts #Cinema4D #C4D #popping #popcorn #cinema #redshift #c4d
    Popping Popcorn in Cinema 4D and Redshift - C4D Tutorial (Free Project)
    www.youtube.com
    Popping Popcorn in Cinema 4D and Redshift – Tutorial and Project File. ⬇️ Download Project File Here ➜ https://cgshortcuts.com/popping-popcorn-in-cinema-4d-and-redshift ❓❓❓Have a CINEMA 4D Question? Ask it below or contact us here: https://cgshortcuts.com 👉👉👉 Become a CG SHORTCUTS MEMBER and get access to Pro Training, Time-Saving Project Files, Courses, C4D Support & more - https://cgshortcuts.com/membership Now also available on Patreon: https://link.cgshortcuts.com/Patreon CG Shortcuts with Dave Bergin - Learn Cinema 4D Faster. -------------------------------------------------------------------------------------------------------- ⬇⬇⬇⬇⬇⬇⬇👇 Get your FREE REDSHIFT RENDER CHECKLIST & TUTORIAL! 👇 ⬇⬇⬇⬇⬇⬇ Learn how to render faster and smarter every time ➜ https://cgshortcuts.com/redshift -------------------------------------------------------------------------------------------------------- ⭐Want to learn OCTANE?⭐ Try our Octane Masterclass - NOW INCLUDED WITH MEMBERSHIP ⭐ Available here ➜ https://cgshortcuts.com/octane-masterclass -------------------------------------------------------------------------------------------------------- ⭐Want to learn REDSHIFT?⭐ Try our Redshift Masterclass - NOW INCLUDED WITH MEMBERSHIP ⭐ Available here ➜ https://cgshortcuts.com/redshift-masterclass ------------------------------------------------------------------------------------------------------------ ⭐ We render all of our projects on Drop & Render Farm for Cinema 4D - GET €10 RENDER CREDITS HERE ➜ https://link.cgshortcuts.com/dropandrender ------------------------------------------------------------------------------------------------------------ 💻 Get more tutorials and resources on our website! https://www.cgshortcuts.com 🎓Find our courses at CG Shortcuts Courses https://www.cgshortcuts.net 😃 To share your work with the CG Community you can post on the Facebook group, would love to see what you've made with the tutorials! Join here: https://link.cgshortcuts.com/FacebookGroup 👉 Get More Videos and Free Stuff - Subscribe ➜ https://link.cgshortcuts.com/YouTubeChannel Ask us a question or let me know what you want to see next in the comments section below! ▼ FOLLOW US ▼ ⭐ Website: https://www.cgshortcuts.com ❤ Patreon: https://www.patreon.com/cgshortcuts 🎓 Courses: https://www.cgshortcuts.net 😃 Facebook: https://www.facebook.com/cgshortcuts 📸 Instagram: https://www.instagram.com/cgshortcuts ❌ X (Twitter): https://twitter.com/cgshortcuts #CGShortcuts #Cinema4D #C4D
    0 Comentários ·0 Compartilhamentos ·0 Anterior
  • Pixel FX Overlay Material in Unreal Engine 5 #shorts

    Pixel FX Overlay Material in Unreal Engine 5 #shorts

    #UnrealEngine #RealtimeVFX #pixel
    #pixel #overlay #material #unreal #engine
    Pixel FX Overlay Material in Unreal Engine 5 #shorts
    Pixel FX Overlay Material in Unreal Engine 5 #shorts #UnrealEngine #RealtimeVFX #pixel #pixel #overlay #material #unreal #engine
    Pixel FX Overlay Material in Unreal Engine 5 #shorts
    www.youtube.com
    Pixel FX Overlay Material in Unreal Engine 5 #shorts https://linktr.ee/cghow #UnrealEngine #RealtimeVFX #pixel
    13 Comentários ·0 Compartilhamentos ·0 Anterior
  • Katamari Physics Return! // Blender Tutorial

    Here is the website I used, try it now ➟ /

    Join ➟ /
    Addon of Addons

    Or...#Hunyuan-3D #Tencent
    #katamari #physics #return #blender #tutorial
    Katamari Physics Return! // Blender Tutorial
    Here is the website I used, try it now ➟ / ⭐Join⭐ ➟ / 🪄Addon of Addons🪄 ➟ Or...#Hunyuan-3D #Tencent #katamari #physics #return #blender #tutorial
    Katamari Physics Return! // Blender Tutorial
    www.youtube.com
    Here is the website I used, try it now ➟ https://3d.hunyuan.tencent.com/ https://workwith.ahaglobal.io/4kfX0Mv ⭐Join⭐ ➟ https://www.cgmatter.com/ 🪄Addon of Addons🪄 ➟ https://superhivemarket.com/products/genie Or... (if you prefer Patreon) https://www.patreon.com/cg_matter #Hunyuan-3D #Tencent
    13 Comentários ·0 Compartilhamentos ·0 Anterior
  • Make Water Caustics in Blender #tutoria #eevee #blender3d #3d

    #make #water #caustics #blender #tutoria
    Make Water Caustics in Blender #tutoria #eevee #blender3d #3d
    #make #water #caustics #blender #tutoria
    10 Comentários ·0 Compartilhamentos ·0 Anterior
  • Unreal Engine 5 RTS with C++ - Part 33 - Revert Resource Cost of Buildings When Building Cancelled

    Project Files: .
    This is the 33rd part of the tutorial series, where we are going to implement a Real Time Strategy game using Unreal Engine and C++. Today we are going to work on how to revert the cost of buildings when the construction is cancelled. Earlier we implemented a way to deduct resource requirements such as wood from the resource attributes set. But if the building placement was cancelled due to some reason, we would need to cancel the cost and add the resource cost back to total resource count.

    Full C++ RTS Playlist: .

    Unreal Strategy game with Blueprints series:

    𝐒𝐮𝐩𝐩𝐨𝐫𝐭 𝐓𝐡𝐞 𝐂𝐡𝐚𝐧𝐧𝐞𝐥 // 𝐁𝐞𝐜𝐨𝐦𝐞 𝐀 𝐏𝐚𝐭𝐫𝐨𝐧!

    ►Patrons will have access to project files of all the stuff I do in the channel and other extra benefits

    Join this channel to get access to perks:


    Like my facebook page for more content : /
    Follow me on twitter :
    Follow me on reddit :
    #CodeLikeMe #unrealengine #ue5 #ue4 #indiegamedev
    #unreal #engine #rts #with #part
    Unreal Engine 5 RTS with C++ - Part 33 - Revert Resource Cost of Buildings When Building Cancelled
    Project Files: . This is the 33rd part of the tutorial series, where we are going to implement a Real Time Strategy game using Unreal Engine and C++. Today we are going to work on how to revert the cost of buildings when the construction is cancelled. Earlier we implemented a way to deduct resource requirements such as wood from the resource attributes set. But if the building placement was cancelled due to some reason, we would need to cancel the cost and add the resource cost back to total resource count. Full C++ RTS Playlist: . Unreal Strategy game with Blueprints series: ► 👇 𝐒𝐮𝐩𝐩𝐨𝐫𝐭 𝐓𝐡𝐞 𝐂𝐡𝐚𝐧𝐧𝐞𝐥 // 𝐁𝐞𝐜𝐨𝐦𝐞 𝐀 𝐏𝐚𝐭𝐫𝐨𝐧! ►Patrons will have access to project files of all the stuff I do in the channel and other extra benefits Join this channel to get access to perks: Like my facebook page for more content : / Follow me on twitter : Follow me on reddit : #CodeLikeMe #unrealengine #ue5 #ue4 #indiegamedev #unreal #engine #rts #with #part
    Unreal Engine 5 RTS with C++ - Part 33 - Revert Resource Cost of Buildings When Building Cancelled
    www.youtube.com
    Project Files: https://www.patreon.com/posts/129749174 . This is the 33rd part of the tutorial series, where we are going to implement a Real Time Strategy game using Unreal Engine and C++. Today we are going to work on how to revert the cost of buildings when the construction is cancelled. Earlier we implemented a way to deduct resource requirements such as wood from the resource attributes set. But if the building placement was cancelled due to some reason, we would need to cancel the cost and add the resource cost back to total resource count. Full C++ RTS Playlist: https://www.youtube.com/playlist?list=PLNTm9yU0zou5_PYxEdjNbAgbVRn-daOga . Unreal Strategy game with Blueprints series: https://www.youtube.com/playlist?list=PLNTm9yU0zou4Eulmi8YIfzHiNZEzfbSMk ► 👇 𝐒𝐮𝐩𝐩𝐨𝐫𝐭 𝐓𝐡𝐞 𝐂𝐡𝐚𝐧𝐧𝐞𝐥 // 𝐁𝐞𝐜𝐨𝐦𝐞 𝐀 𝐏𝐚𝐭𝐫𝐨𝐧! https://www.patreon.com/codelikeme ►Patrons will have access to project files of all the stuff I do in the channel and other extra benefits Join this channel to get access to perks: https://www.youtube.com/channel/UClb6Jh9EBV7a_Nm52Ipll_Q/join Like my facebook page for more content : https://www.facebook.com/gamedevelopersclub/ Follow me on twitter : https://twitter.com/CodeLikeMe2 Follow me on reddit : https://www.reddit.com/user/codelikeme #CodeLikeMe #unrealengine #ue5 #ue4 #indiegamedev
    12 Comentários ·0 Compartilhamentos ·0 Anterior
  • FrodoKEM: A conservative quantum-safe cryptographic algorithm

    In this post, we describe FrodoKEM, a key encapsulation protocol that offers a simple design and provides strong security guarantees even in a future with powerful quantum computers.
    The quantum threat to cryptography
    For decades, modern cryptography has relied on mathematical problems that are practically impossible for classical computers to solve without a secret key. Cryptosystems like RSA, Diffie-Hellman key-exchange, and elliptic curve-based schemes—which rely on the hardness of the integer factorization anddiscrete logarithm problems—secure communications on the internet, banking transactions, and even national security systems. However, the emergence of
    Quantum computers leverage the principles of quantum mechanics to perform certain calculations exponentially faster than classical computers. Their ability to solve complex problems, such as simulating molecular interactions, optimizing large-scale systems, and accelerating machine learning, is expected to have profound and beneficial implications for fields ranging from chemistry and material science to artificial intelligence.

    Spotlight: AI-POWERED EXPERIENCE

    Microsoft research copilot experience
    Discover more about research at Microsoft through our AI-powered experience

    Start now

    Opens in a new tab
    At the same time, quantum computing is poised to disrupt cryptography. In particular, Shor’s algorithm, a quantum algorithm developed in 1994, can efficiently factor large numbers and compute discrete logarithms—the very problems that underpin the security of RSA, Diffie-Hellman, and elliptic curve cryptography. This means that once large-scale, fault-tolerant quantum computers become available, public-key protocols based on RSA, ECC, and Diffie-Hellman will become insecure, breaking a sizable portion of the cryptographic backbone of today’s digital world. Recent advances in quantum computing, such as Microsoft’s Majorana 1, the first quantum processor powered by topological qubits, represent major steps toward practical quantum computing and underscore the urgency of transitioning to quantum-resistant cryptographic systems.
    To address this looming security crisis, cryptographers and government agencies have been working on post-quantum cryptography—new cryptographic algorithms that can resist attacks from both classical and quantum computers.
    The NIST Post-Quantum Cryptography Standardization effort
    In 2017, the U.S. National Institute of Standards and Technologylaunched the Post-Quantum Cryptography Standardization projectto evaluate and select cryptographic algorithms capable of withstanding quantum attacks. As part of this initiative, NIST sought proposals for two types of cryptographic primitives: key encapsulation mechanisms—which enable two parties to securely derive a shared key to establish an encrypted connection, similar to traditional key exchange schemes—and digital signature schemes.
    This initiative attracted submissions from cryptographers worldwide, and after multiple evaluation rounds, NIST selected CRYSTALS-Kyber, a KEM based on structured lattices, and standardized it as ML-KEM. Additionally, NIST selected three digital signature schemes: CRYSTALS-Dilithium, now called ML-DSA; SPHINCS+, now called SLH-DSA; and Falcon, now called FN-DSA.
    While ML-KEM provides great overall security and efficiency, some governments and cryptographic researchers advocate for the inclusion and standardization of alternative algorithms that minimize reliance on algebraic structure. Reducing algebraic structure might prevent potential vulnerabilities and, hence, can be considered a more conservative design choice. One such algorithm is FrodoKEM.
    International standardization of post-quantum cryptography
    Beyond NIST, other international standardization bodies have been actively working on quantum-resistant cryptographic solutions. The International Organization for Standardizationis leading a global effort to standardize additional PQC algorithms. Notably, European government agencies—including Germany’s BSI, the Netherlands’ NLNCSA and AIVD, and France’s ANSSI—have shown strong support for FrodoKEM, recognizing it as a conservative alternative to structured lattice-based schemes.
    As a result, FrodoKEM is undergoing standardization at ISO. Additionally, ISO is standardizing ML-KEM and a conservative code-based KEM called Classic McEliece. These three algorithms are planned for inclusion in ISO/IEC 18033-2:2006 as Amendment 2.
    What is FrodoKEM?
    FrodoKEM is a key encapsulation mechanismbased on the Learning with Errorsproblem, a cornerstone of lattice-based cryptography. Unlike structured lattice-based schemes such as ML-KEM, FrodoKEM is built on generic, unstructured lattices, i.e., it is based on the plain LWE problem.
    Why unstructured lattices?
    Structured lattice-based schemes introduce additional algebraic properties that could potentially be exploited in future cryptanalytic attacks. By using unstructured lattices, FrodoKEM eliminates these concerns, making it a safer choice in the long run, albeit at the cost of larger key sizes and lower efficiency.
    It is important to emphasize that no particular cryptanalytic weaknesses are currently known for recommended parameterizations of structured lattice schemes in comparison to plain LWE. However, our current understanding of the security of these schemes could potentially change in the future with cryptanalytic advances.
    Lattices and the Learning with Errorsproblem
    Lattice-based cryptography relies on the mathematical structure of lattices, which are regular arrangements of points in multidimensional space. A lattice is defined as the set of all integer linear combinations of a set of basis vectors. The difficulty of certain computational problems on lattices, such as the Shortest Vector Problemand the Learning with Errorsproblem, forms the basis of lattice-based schemes.
    The Learning with Errorsproblem
    The LWE problem is a fundamental hard problem in lattice-based cryptography. It involves solving a system of linear equations where some small random error has been added to each equation, making it extremely difficult to recover the original secret values. This added error ensures that the problem remains computationally infeasible, even for quantum computers. Figure 1 below illustrates the LWE problem, specifically, the search version of the problem.
    As can be seen in Figure 1, for the setup of the problem we need a dimension \that defines the size of matrices, a modulus \that defines the value range of the matrix coefficients, and a certain error distribution \from which we sample \matrices. We sample two matrices from \, a small matrix \and an error matrix \; sample an \matrix \uniformly at random; and compute \. In the illustration, each matrix coefficient is represented by a colored square, and the “legend of coefficients” gives an idea of the size of the respective coefficients, e.g., orange squares represent the small coefficients of matrix \ ). Finally, given \and \, the search LWE problem consists in finding \. This problem is believed to be hard for suitably chosen parameterssufficiently large) and is used at the core of FrodoKEM.
    In comparison, the LWE variant used in ML-KEM—called Module-LWE—has additional symmetries, adding mathematical structure that helps improve efficiency. In a setting similar to that of the search LWE problem above, the matrix \can be represented by just a single row of coefficients.
    FIGURE 1: Visualization of theLWE problem.
    LWE is conjectured to be quantum-resistant, and FrodoKEM’s security is directly tied to its hardness. In other words, cryptanalysts and quantum researchers have not been able to devise an efficient quantum algorithm capable of solving the LWE problem and, hence, FrodoKEM. In cryptography, absolute security can never be guaranteed; instead, confidence in a problem’s hardness comes from extensive scrutiny and its resilience against attacks over time.
    How FrodoKEM Works
    FrodoKEM follows the standard paradigm of a KEM, which consists of three main operations—key generation, encapsulation, and decapsulation—performed interactively between a sender and a recipient with the goal of establishing a shared secret key:

    Key generation, computed by the recipient

    Generates a public key and a secret key.
    The public key is sent to the sender, while the private key remains secret.

    Encapsulation, computed by the sender

    Generates a random session key.
    Encrypts the session key using the recipient’s public key to produce a ciphertext.
    Produces a shared key using the session key and the ciphertext.
    The ciphertext is sent to the recipient.

    Decapsulation, computed by the recipient

    Decrypts the ciphertext using their secret key to recover the original session key.
    Reproduces the shared key using the decrypted session key and the ciphertext.

    The shared key generated by the sender and reconstructed by the recipient can then be used to establish secure symmetric-key encryption for further communication between the two parties.
    Figure 2 below shows a simplified view of the FrodoKEM protocol. As highlighted in red, FrodoKEM uses at its core LWE operations of the form “\”, which are directly applied within the KEM paradigm.
    FIGURE 2: Simplified overview of FrodoKEM.
    Performance: Strong security has a cost
    Not relying on additional algebraic structure certainly comes at a cost for FrodoKEM in the form of increased protocol runtime and bandwidth. The table below compares the performance and key sizes corresponding to the FrodoKEM level 1 parameter setand the respective parameter set of ML-KEM. These parameter sets are intended to match or exceed the brute force security of AES-128. As can be seen, the difference in speed and key sizes between FrodoKEM and ML-KEM is more than an order of magnitude. Nevertheless, the runtime of the FrodoKEM protocol remains reasonable for most applications. For example, on our benchmarking platform clocked at 3.2GHz, the measured runtimes are 0.97 ms, 1.9 ms, and 3.2 ms for security levels 1, 2, and 3, respectively.
    For security-sensitive applications, a more relevant comparison is with Classic McEliece, a post-quantum code-based scheme also considered for standardization. In this case, FrodoKEM offers several efficiency advantages. Classic McEliece’s public keys are significantly larger—well over an order of magnitude greater than FrodoKEM’s—and its key generation is substantially more computationally expensive. Nonetheless, Classic McEliece provides an advantage in certain static key-exchange scenarios, where its high key generation cost can be amortized across multiple key encapsulation executions.
    TABLE 1: Comparison of key sizes and performance on an x86-64 processor for NIST level 1 parameter sets.
    A holistic design made with security in mind
    FrodoKEM’s design principles support security beyond its reliance on generic, unstructured lattices to minimize the attack surface of potential future cryptanalytic threats. Its parameters have been carefully chosen with additional security margins to withstand advancements in known attacks. Furthermore, FrodoKEM is designed with simplicity in mind—its internal operations are based on straightforward matrix-vector arithmetic using integer coefficients reduced modulo a power of two. These design decisions facilitate simple, compact and secure implementations that are also easier to maintain and to protect against side-channel attacks.
    Conclusion
    After years of research and analysis, the next generation of post-quantum cryptographic algorithms has arrived. NIST has chosen strong PQC protocols that we believe will serve Microsoft and its customers well in many applications. For security-sensitive applications, FrodoKEM offers a secure yet practical approach for post-quantum cryptography. While its reliance on unstructured lattices results in larger key sizes and higher computational overhead compared to structured lattice-based alternatives, it provides strong security assurances against potential future attacks. Given the ongoing standardization efforts and its endorsement by multiple governmental agencies, FrodoKEM is well-positioned as a viable alternative for organizations seeking long-term cryptographic resilience in a post-quantum world.
    Further Reading
    For those interested in learning more about FrodoKEM, post-quantum cryptography, and lattice-based cryptography, the following resources provide valuable insights:

    The official FrodoKEM website: /, which contains, among several other resources, FrodoKEM’s specification document.
    The official FrodoKEM software library:, which contains reference and optimized implementations of FrodoKEM written in C and Python.
    NIST’s Post-Quantum Cryptography Project:.
    Microsoft’s blogpost on its transition plan for PQC:.
    A comprehensive survey on lattice-based cryptography: Peikert, C. “A Decade of Lattice Cryptography.” Foundations and Trends in Theoretical Computer Science.A comprehensive tutorial on modern lattice-based schemes, including ML-KEM and ML-DSA: Lyubashevsky, V. “Basic Lattice Cryptography: The concepts behind Kyberand Dilithium.”.Opens in a new tab
    #frodokem #conservative #quantumsafe #cryptographic #algorithm
    FrodoKEM: A conservative quantum-safe cryptographic algorithm
    In this post, we describe FrodoKEM, a key encapsulation protocol that offers a simple design and provides strong security guarantees even in a future with powerful quantum computers. The quantum threat to cryptography For decades, modern cryptography has relied on mathematical problems that are practically impossible for classical computers to solve without a secret key. Cryptosystems like RSA, Diffie-Hellman key-exchange, and elliptic curve-based schemes—which rely on the hardness of the integer factorization anddiscrete logarithm problems—secure communications on the internet, banking transactions, and even national security systems. However, the emergence of Quantum computers leverage the principles of quantum mechanics to perform certain calculations exponentially faster than classical computers. Their ability to solve complex problems, such as simulating molecular interactions, optimizing large-scale systems, and accelerating machine learning, is expected to have profound and beneficial implications for fields ranging from chemistry and material science to artificial intelligence. Spotlight: AI-POWERED EXPERIENCE Microsoft research copilot experience Discover more about research at Microsoft through our AI-powered experience Start now Opens in a new tab At the same time, quantum computing is poised to disrupt cryptography. In particular, Shor’s algorithm, a quantum algorithm developed in 1994, can efficiently factor large numbers and compute discrete logarithms—the very problems that underpin the security of RSA, Diffie-Hellman, and elliptic curve cryptography. This means that once large-scale, fault-tolerant quantum computers become available, public-key protocols based on RSA, ECC, and Diffie-Hellman will become insecure, breaking a sizable portion of the cryptographic backbone of today’s digital world. Recent advances in quantum computing, such as Microsoft’s Majorana 1, the first quantum processor powered by topological qubits, represent major steps toward practical quantum computing and underscore the urgency of transitioning to quantum-resistant cryptographic systems. To address this looming security crisis, cryptographers and government agencies have been working on post-quantum cryptography—new cryptographic algorithms that can resist attacks from both classical and quantum computers. The NIST Post-Quantum Cryptography Standardization effort In 2017, the U.S. National Institute of Standards and Technologylaunched the Post-Quantum Cryptography Standardization projectto evaluate and select cryptographic algorithms capable of withstanding quantum attacks. As part of this initiative, NIST sought proposals for two types of cryptographic primitives: key encapsulation mechanisms—which enable two parties to securely derive a shared key to establish an encrypted connection, similar to traditional key exchange schemes—and digital signature schemes. This initiative attracted submissions from cryptographers worldwide, and after multiple evaluation rounds, NIST selected CRYSTALS-Kyber, a KEM based on structured lattices, and standardized it as ML-KEM. Additionally, NIST selected three digital signature schemes: CRYSTALS-Dilithium, now called ML-DSA; SPHINCS+, now called SLH-DSA; and Falcon, now called FN-DSA. While ML-KEM provides great overall security and efficiency, some governments and cryptographic researchers advocate for the inclusion and standardization of alternative algorithms that minimize reliance on algebraic structure. Reducing algebraic structure might prevent potential vulnerabilities and, hence, can be considered a more conservative design choice. One such algorithm is FrodoKEM. International standardization of post-quantum cryptography Beyond NIST, other international standardization bodies have been actively working on quantum-resistant cryptographic solutions. The International Organization for Standardizationis leading a global effort to standardize additional PQC algorithms. Notably, European government agencies—including Germany’s BSI, the Netherlands’ NLNCSA and AIVD, and France’s ANSSI—have shown strong support for FrodoKEM, recognizing it as a conservative alternative to structured lattice-based schemes. As a result, FrodoKEM is undergoing standardization at ISO. Additionally, ISO is standardizing ML-KEM and a conservative code-based KEM called Classic McEliece. These three algorithms are planned for inclusion in ISO/IEC 18033-2:2006 as Amendment 2. What is FrodoKEM? FrodoKEM is a key encapsulation mechanismbased on the Learning with Errorsproblem, a cornerstone of lattice-based cryptography. Unlike structured lattice-based schemes such as ML-KEM, FrodoKEM is built on generic, unstructured lattices, i.e., it is based on the plain LWE problem. Why unstructured lattices? Structured lattice-based schemes introduce additional algebraic properties that could potentially be exploited in future cryptanalytic attacks. By using unstructured lattices, FrodoKEM eliminates these concerns, making it a safer choice in the long run, albeit at the cost of larger key sizes and lower efficiency. It is important to emphasize that no particular cryptanalytic weaknesses are currently known for recommended parameterizations of structured lattice schemes in comparison to plain LWE. However, our current understanding of the security of these schemes could potentially change in the future with cryptanalytic advances. Lattices and the Learning with Errorsproblem Lattice-based cryptography relies on the mathematical structure of lattices, which are regular arrangements of points in multidimensional space. A lattice is defined as the set of all integer linear combinations of a set of basis vectors. The difficulty of certain computational problems on lattices, such as the Shortest Vector Problemand the Learning with Errorsproblem, forms the basis of lattice-based schemes. The Learning with Errorsproblem The LWE problem is a fundamental hard problem in lattice-based cryptography. It involves solving a system of linear equations where some small random error has been added to each equation, making it extremely difficult to recover the original secret values. This added error ensures that the problem remains computationally infeasible, even for quantum computers. Figure 1 below illustrates the LWE problem, specifically, the search version of the problem. As can be seen in Figure 1, for the setup of the problem we need a dimension \that defines the size of matrices, a modulus \that defines the value range of the matrix coefficients, and a certain error distribution \from which we sample \matrices. We sample two matrices from \, a small matrix \and an error matrix \; sample an \matrix \uniformly at random; and compute \. In the illustration, each matrix coefficient is represented by a colored square, and the “legend of coefficients” gives an idea of the size of the respective coefficients, e.g., orange squares represent the small coefficients of matrix \ ). Finally, given \and \, the search LWE problem consists in finding \. This problem is believed to be hard for suitably chosen parameterssufficiently large) and is used at the core of FrodoKEM. In comparison, the LWE variant used in ML-KEM—called Module-LWE—has additional symmetries, adding mathematical structure that helps improve efficiency. In a setting similar to that of the search LWE problem above, the matrix \can be represented by just a single row of coefficients. FIGURE 1: Visualization of theLWE problem. LWE is conjectured to be quantum-resistant, and FrodoKEM’s security is directly tied to its hardness. In other words, cryptanalysts and quantum researchers have not been able to devise an efficient quantum algorithm capable of solving the LWE problem and, hence, FrodoKEM. In cryptography, absolute security can never be guaranteed; instead, confidence in a problem’s hardness comes from extensive scrutiny and its resilience against attacks over time. How FrodoKEM Works FrodoKEM follows the standard paradigm of a KEM, which consists of three main operations—key generation, encapsulation, and decapsulation—performed interactively between a sender and a recipient with the goal of establishing a shared secret key: Key generation, computed by the recipient Generates a public key and a secret key. The public key is sent to the sender, while the private key remains secret. Encapsulation, computed by the sender Generates a random session key. Encrypts the session key using the recipient’s public key to produce a ciphertext. Produces a shared key using the session key and the ciphertext. The ciphertext is sent to the recipient. Decapsulation, computed by the recipient Decrypts the ciphertext using their secret key to recover the original session key. Reproduces the shared key using the decrypted session key and the ciphertext. The shared key generated by the sender and reconstructed by the recipient can then be used to establish secure symmetric-key encryption for further communication between the two parties. Figure 2 below shows a simplified view of the FrodoKEM protocol. As highlighted in red, FrodoKEM uses at its core LWE operations of the form “\”, which are directly applied within the KEM paradigm. FIGURE 2: Simplified overview of FrodoKEM. Performance: Strong security has a cost Not relying on additional algebraic structure certainly comes at a cost for FrodoKEM in the form of increased protocol runtime and bandwidth. The table below compares the performance and key sizes corresponding to the FrodoKEM level 1 parameter setand the respective parameter set of ML-KEM. These parameter sets are intended to match or exceed the brute force security of AES-128. As can be seen, the difference in speed and key sizes between FrodoKEM and ML-KEM is more than an order of magnitude. Nevertheless, the runtime of the FrodoKEM protocol remains reasonable for most applications. For example, on our benchmarking platform clocked at 3.2GHz, the measured runtimes are 0.97 ms, 1.9 ms, and 3.2 ms for security levels 1, 2, and 3, respectively. For security-sensitive applications, a more relevant comparison is with Classic McEliece, a post-quantum code-based scheme also considered for standardization. In this case, FrodoKEM offers several efficiency advantages. Classic McEliece’s public keys are significantly larger—well over an order of magnitude greater than FrodoKEM’s—and its key generation is substantially more computationally expensive. Nonetheless, Classic McEliece provides an advantage in certain static key-exchange scenarios, where its high key generation cost can be amortized across multiple key encapsulation executions. TABLE 1: Comparison of key sizes and performance on an x86-64 processor for NIST level 1 parameter sets. A holistic design made with security in mind FrodoKEM’s design principles support security beyond its reliance on generic, unstructured lattices to minimize the attack surface of potential future cryptanalytic threats. Its parameters have been carefully chosen with additional security margins to withstand advancements in known attacks. Furthermore, FrodoKEM is designed with simplicity in mind—its internal operations are based on straightforward matrix-vector arithmetic using integer coefficients reduced modulo a power of two. These design decisions facilitate simple, compact and secure implementations that are also easier to maintain and to protect against side-channel attacks. Conclusion After years of research and analysis, the next generation of post-quantum cryptographic algorithms has arrived. NIST has chosen strong PQC protocols that we believe will serve Microsoft and its customers well in many applications. For security-sensitive applications, FrodoKEM offers a secure yet practical approach for post-quantum cryptography. While its reliance on unstructured lattices results in larger key sizes and higher computational overhead compared to structured lattice-based alternatives, it provides strong security assurances against potential future attacks. Given the ongoing standardization efforts and its endorsement by multiple governmental agencies, FrodoKEM is well-positioned as a viable alternative for organizations seeking long-term cryptographic resilience in a post-quantum world. Further Reading For those interested in learning more about FrodoKEM, post-quantum cryptography, and lattice-based cryptography, the following resources provide valuable insights: The official FrodoKEM website: /, which contains, among several other resources, FrodoKEM’s specification document. The official FrodoKEM software library:, which contains reference and optimized implementations of FrodoKEM written in C and Python. NIST’s Post-Quantum Cryptography Project:. Microsoft’s blogpost on its transition plan for PQC:. A comprehensive survey on lattice-based cryptography: Peikert, C. “A Decade of Lattice Cryptography.” Foundations and Trends in Theoretical Computer Science.A comprehensive tutorial on modern lattice-based schemes, including ML-KEM and ML-DSA: Lyubashevsky, V. “Basic Lattice Cryptography: The concepts behind Kyberand Dilithium.”.Opens in a new tab #frodokem #conservative #quantumsafe #cryptographic #algorithm
    FrodoKEM: A conservative quantum-safe cryptographic algorithm
    www.microsoft.com
    In this post, we describe FrodoKEM, a key encapsulation protocol that offers a simple design and provides strong security guarantees even in a future with powerful quantum computers. The quantum threat to cryptography For decades, modern cryptography has relied on mathematical problems that are practically impossible for classical computers to solve without a secret key. Cryptosystems like RSA, Diffie-Hellman key-exchange, and elliptic curve-based schemes—which rely on the hardness of the integer factorization and (elliptic curve) discrete logarithm problems—secure communications on the internet, banking transactions, and even national security systems. However, the emergence of Quantum computers leverage the principles of quantum mechanics to perform certain calculations exponentially faster than classical computers. Their ability to solve complex problems, such as simulating molecular interactions, optimizing large-scale systems, and accelerating machine learning, is expected to have profound and beneficial implications for fields ranging from chemistry and material science to artificial intelligence. Spotlight: AI-POWERED EXPERIENCE Microsoft research copilot experience Discover more about research at Microsoft through our AI-powered experience Start now Opens in a new tab At the same time, quantum computing is poised to disrupt cryptography. In particular, Shor’s algorithm, a quantum algorithm developed in 1994, can efficiently factor large numbers and compute discrete logarithms—the very problems that underpin the security of RSA, Diffie-Hellman, and elliptic curve cryptography. This means that once large-scale, fault-tolerant quantum computers become available, public-key protocols based on RSA, ECC, and Diffie-Hellman will become insecure, breaking a sizable portion of the cryptographic backbone of today’s digital world. Recent advances in quantum computing, such as Microsoft’s Majorana 1 (opens in new tab), the first quantum processor powered by topological qubits, represent major steps toward practical quantum computing and underscore the urgency of transitioning to quantum-resistant cryptographic systems. To address this looming security crisis, cryptographers and government agencies have been working on post-quantum cryptography (PQC)—new cryptographic algorithms that can resist attacks from both classical and quantum computers. The NIST Post-Quantum Cryptography Standardization effort In 2017, the U.S. National Institute of Standards and Technology (NIST) launched the Post-Quantum Cryptography Standardization project (opens in new tab) to evaluate and select cryptographic algorithms capable of withstanding quantum attacks. As part of this initiative, NIST sought proposals for two types of cryptographic primitives: key encapsulation mechanisms (KEMs)—which enable two parties to securely derive a shared key to establish an encrypted connection, similar to traditional key exchange schemes—and digital signature schemes. This initiative attracted submissions from cryptographers worldwide, and after multiple evaluation rounds, NIST selected CRYSTALS-Kyber, a KEM based on structured lattices, and standardized it as ML-KEM (opens in new tab). Additionally, NIST selected three digital signature schemes: CRYSTALS-Dilithium, now called ML-DSA; SPHINCS+, now called SLH-DSA; and Falcon, now called FN-DSA. While ML-KEM provides great overall security and efficiency, some governments and cryptographic researchers advocate for the inclusion and standardization of alternative algorithms that minimize reliance on algebraic structure. Reducing algebraic structure might prevent potential vulnerabilities and, hence, can be considered a more conservative design choice. One such algorithm is FrodoKEM. International standardization of post-quantum cryptography Beyond NIST, other international standardization bodies have been actively working on quantum-resistant cryptographic solutions. The International Organization for Standardization (ISO) is leading a global effort to standardize additional PQC algorithms. Notably, European government agencies—including Germany’s BSI (opens in new tab), the Netherlands’ NLNCSA and AIVD (opens in new tab), and France’s ANSSI (opens in new tab)—have shown strong support for FrodoKEM, recognizing it as a conservative alternative to structured lattice-based schemes. As a result, FrodoKEM is undergoing standardization at ISO. Additionally, ISO is standardizing ML-KEM and a conservative code-based KEM called Classic McEliece. These three algorithms are planned for inclusion in ISO/IEC 18033-2:2006 as Amendment 2 (opens in new tab). What is FrodoKEM? FrodoKEM is a key encapsulation mechanism (KEM) based on the Learning with Errors (LWE) problem, a cornerstone of lattice-based cryptography. Unlike structured lattice-based schemes such as ML-KEM, FrodoKEM is built on generic, unstructured lattices, i.e., it is based on the plain LWE problem. Why unstructured lattices? Structured lattice-based schemes introduce additional algebraic properties that could potentially be exploited in future cryptanalytic attacks. By using unstructured lattices, FrodoKEM eliminates these concerns, making it a safer choice in the long run, albeit at the cost of larger key sizes and lower efficiency. It is important to emphasize that no particular cryptanalytic weaknesses are currently known for recommended parameterizations of structured lattice schemes in comparison to plain LWE. However, our current understanding of the security of these schemes could potentially change in the future with cryptanalytic advances. Lattices and the Learning with Errors (LWE) problem Lattice-based cryptography relies on the mathematical structure of lattices, which are regular arrangements of points in multidimensional space. A lattice is defined as the set of all integer linear combinations of a set of basis vectors. The difficulty of certain computational problems on lattices, such as the Shortest Vector Problem (SVP) and the Learning with Errors (LWE) problem, forms the basis of lattice-based schemes. The Learning with Errors (LWE) problem The LWE problem is a fundamental hard problem in lattice-based cryptography. It involves solving a system of linear equations where some small random error has been added to each equation, making it extremely difficult to recover the original secret values. This added error ensures that the problem remains computationally infeasible, even for quantum computers. Figure 1 below illustrates the LWE problem, specifically, the search version of the problem. As can be seen in Figure 1, for the setup of the problem we need a dimension \(n\) that defines the size of matrices, a modulus \(q\) that defines the value range of the matrix coefficients, and a certain error distribution \(\chi\) from which we sample \(\textit{“small”}\) matrices. We sample two matrices from \(\chi\), a small matrix \(\text{s}\) and an error matrix \(\text{e}\) (for simplicity in the explanation, we assume that both have only one column); sample an \(n \times n\) matrix \(\text{A}\) uniformly at random; and compute \(\text{b} = \text{A} \times \text{s} + \text{e}\). In the illustration, each matrix coefficient is represented by a colored square, and the “legend of coefficients” gives an idea of the size of the respective coefficients, e.g., orange squares represent the small coefficients of matrix \(\text{s}\) (small relative to the modulus \(q\)). Finally, given \(\text{A}\) and \(\text{b}\), the search LWE problem consists in finding \(\text{s}\). This problem is believed to be hard for suitably chosen parameters (e.g., for dimension \(n\) sufficiently large) and is used at the core of FrodoKEM. In comparison, the LWE variant used in ML-KEM—called Module-LWE (M-LWE)—has additional symmetries, adding mathematical structure that helps improve efficiency. In a setting similar to that of the search LWE problem above, the matrix \(\text{A}\) can be represented by just a single row of coefficients. FIGURE 1: Visualization of the (search) LWE problem. LWE is conjectured to be quantum-resistant, and FrodoKEM’s security is directly tied to its hardness. In other words, cryptanalysts and quantum researchers have not been able to devise an efficient quantum algorithm capable of solving the LWE problem and, hence, FrodoKEM. In cryptography, absolute security can never be guaranteed; instead, confidence in a problem’s hardness comes from extensive scrutiny and its resilience against attacks over time. How FrodoKEM Works FrodoKEM follows the standard paradigm of a KEM, which consists of three main operations—key generation, encapsulation, and decapsulation—performed interactively between a sender and a recipient with the goal of establishing a shared secret key: Key generation (KeyGen), computed by the recipient Generates a public key and a secret key. The public key is sent to the sender, while the private key remains secret. Encapsulation (Encapsulate), computed by the sender Generates a random session key. Encrypts the session key using the recipient’s public key to produce a ciphertext. Produces a shared key using the session key and the ciphertext. The ciphertext is sent to the recipient. Decapsulation (Decapsulate), computed by the recipient Decrypts the ciphertext using their secret key to recover the original session key. Reproduces the shared key using the decrypted session key and the ciphertext. The shared key generated by the sender and reconstructed by the recipient can then be used to establish secure symmetric-key encryption for further communication between the two parties. Figure 2 below shows a simplified view of the FrodoKEM protocol. As highlighted in red, FrodoKEM uses at its core LWE operations of the form “\(\text{b} = \text{A} \times \text{s} + \text{e}\)”, which are directly applied within the KEM paradigm. FIGURE 2: Simplified overview of FrodoKEM. Performance: Strong security has a cost Not relying on additional algebraic structure certainly comes at a cost for FrodoKEM in the form of increased protocol runtime and bandwidth. The table below compares the performance and key sizes corresponding to the FrodoKEM level 1 parameter set (variant called “FrodoKEM-640-AES”) and the respective parameter set of ML-KEM (variant called “ML-KEM-512”). These parameter sets are intended to match or exceed the brute force security of AES-128. As can be seen, the difference in speed and key sizes between FrodoKEM and ML-KEM is more than an order of magnitude. Nevertheless, the runtime of the FrodoKEM protocol remains reasonable for most applications. For example, on our benchmarking platform clocked at 3.2GHz, the measured runtimes are 0.97 ms, 1.9 ms, and 3.2 ms for security levels 1, 2, and 3, respectively. For security-sensitive applications, a more relevant comparison is with Classic McEliece, a post-quantum code-based scheme also considered for standardization. In this case, FrodoKEM offers several efficiency advantages. Classic McEliece’s public keys are significantly larger—well over an order of magnitude greater than FrodoKEM’s—and its key generation is substantially more computationally expensive. Nonetheless, Classic McEliece provides an advantage in certain static key-exchange scenarios, where its high key generation cost can be amortized across multiple key encapsulation executions. TABLE 1: Comparison of key sizes and performance on an x86-64 processor for NIST level 1 parameter sets. A holistic design made with security in mind FrodoKEM’s design principles support security beyond its reliance on generic, unstructured lattices to minimize the attack surface of potential future cryptanalytic threats. Its parameters have been carefully chosen with additional security margins to withstand advancements in known attacks. Furthermore, FrodoKEM is designed with simplicity in mind—its internal operations are based on straightforward matrix-vector arithmetic using integer coefficients reduced modulo a power of two. These design decisions facilitate simple, compact and secure implementations that are also easier to maintain and to protect against side-channel attacks. Conclusion After years of research and analysis, the next generation of post-quantum cryptographic algorithms has arrived. NIST has chosen strong PQC protocols that we believe will serve Microsoft and its customers well in many applications. For security-sensitive applications, FrodoKEM offers a secure yet practical approach for post-quantum cryptography. While its reliance on unstructured lattices results in larger key sizes and higher computational overhead compared to structured lattice-based alternatives, it provides strong security assurances against potential future attacks. Given the ongoing standardization efforts and its endorsement by multiple governmental agencies, FrodoKEM is well-positioned as a viable alternative for organizations seeking long-term cryptographic resilience in a post-quantum world. Further Reading For those interested in learning more about FrodoKEM, post-quantum cryptography, and lattice-based cryptography, the following resources provide valuable insights: The official FrodoKEM website: https://frodokem.org/ (opens in new tab), which contains, among several other resources, FrodoKEM’s specification document. The official FrodoKEM software library: https://github.com/Microsoft/PQCrypto-LWEKE (opens in new tab), which contains reference and optimized implementations of FrodoKEM written in C and Python. NIST’s Post-Quantum Cryptography Project: https://csrc.nist.gov/projects/post-quantum-cryptography (opens in new tab). Microsoft’s blogpost on its transition plan for PQC: https://techcommunity.microsoft.com/blog/microsoft-security-blog/microsofts-quantum-resistant-cryptography-is-here/4238780 (opens in new tab). A comprehensive survey on lattice-based cryptography: Peikert, C. “A Decade of Lattice Cryptography.” Foundations and Trends in Theoretical Computer Science. (2016) A comprehensive tutorial on modern lattice-based schemes, including ML-KEM and ML-DSA: Lyubashevsky, V. “Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA).” https://eprint.iacr.org/2024/1287 (opens in new tab). (2024) Opens in a new tab
    0 Comentários ·0 Compartilhamentos ·0 Anterior
CGShares https://cgshares.com