...he VRF function to be post-quantum secure. In general, you need to model a post-quantum adversary, and they have a pretty interesting write-up, which I highly recommend. I’ll pr...