Approaches & Strategies
- A Review of Post-quantum Cryptography and Crypto-agility Strategies: The paper focuses on the established asymmetric and symmetric cryptographic methods and how current security protocols can be adapted against quantum attacks [GAB19]
- API Usability of Stateful Signature Schemes: 有状态签名机制的易用API设计 [ZWH19]
- Agile and versatile quantum communication: Signatures and secrets: In this paper, the authors suggest how these related principles can be applied to the field of quantum cryptography by explicitly demonstrating two quantum cryptographic protocols, quantum digital signatures (QDS) and quantum secret sharing (QSS), on the same hardware sender and receiver platform. [RTK21]
- Agile quantum cryptography and non-classical state generation: Agile quantum cryptography and non-classical state generation: This paper covers a framework of quantum cryptographic agility which allows for a resource-efficient swap of an underlying cryptographic protocol. [T20]
- Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI): 对资源公钥基础设施(RPKI)中算法包的迁移过程进行了形式化 [GKT13]
- Algorithm Agility – Discussion on TPM 2.0 ECC Functionalities: 本文综述了TPM 2.0 ECC的全部功能,讨论了TPM现有命令是否能用于实现标准中还未规定的算法 [CU16]
- Algorithm-agile cryptographic coprocessor based on FPGAs: This contribution describes the design and implementation of an algorithm-agile cryptographic co-processor board. [PCC99]
- Algorithm-agile encryption in ATM networks: The authors designed a research prototype for an ATM encryptor that implements ATM encryption at 155 Mbps, using the Data Encryption Standard (DES) and a low-latency algorithm. [THP98]
- Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization: This paper provides exploratory research by determining the impact of quantum computing threat on modern routing and switching infrastructure components of IT network infrastructure in a large-size financial organization. [PMS19]
- Blog - Achieving ‘Crypto Agility’: This blog covers the steps to take to prepare for the advent of quantum computers. [S19]
- CARAF: Crypto Agility Risk Assessment Framework: The paper covers a framework that can be used by organizations to determine an appropriate mitigation strategy commensurate with their risk tolerance in regard to quantum computers. [MCD21]
- Comparing the Usability of Cryptographic APIs: 该文第一个评估不同密码库的设计和可用性如何影响其应用安全,并分析为何会有此种影响 [ABF17]
- Crypto Agility Is a Must-Have for Data Encryption Standards: This blog post covers the importance of cryptographic agility with the advent of quantum computers. [MS18]
- Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS): This document describes the features, properties, and limitations of RADIUS crypto-agility solutions; defines the term “crypto-agility” as used in this context; and provides the motivations for this work. [N11]
- Cryptographic Agility and Interoperability: Proceedings of a Workshop: This publication summarizes the current challenges and future possibilities of cryptography. [NM17]
- Cryptographic Agility and Its Relation to Circular Encryption: 本文研究了两个话题——弱伪随机生成函数(wPRF)是否是敏捷的,以及(IND-R)安全的加密机制在加密自身密钥时是否也安全 [ABB10]
- Cryptographic Agility in practice: emerging use-cases: In this paper the authors attempt to develop a common understanding of cryptographic agility. [MH19]
- Cryptographic Agility: This article covers cryptographic beliefs and cryptographic agility. [S09]
- Enterprise Agility: Accelerating enterprise agility: In this book, the authors give advice how to prepare your company to navigate the rapidly-moving business world. [M18]
- Fail-Safe-Konzept für Public-Key-Infrastrukturen: 提出了公钥基础设施的故障安全概念 [M02]
- Fluid Intelligence Doesn’t Matter! Effects of Code Examples on the Usability of Crypto APIs: 本文从心理学的角度,研究了问题相似性和流体智力是否会影响人对密码API的使用 [MW20]
- Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms: 为使协议中强制要求实现的算法包能够花费一定时间更换,本文提出了一些指引 [H15]
- Lightweight and adaptable solution for security agility.: The authors propose a lightweight cryptographically agile agreementmodel, which is formally verified. They also present a solution in the Agile CryptographicAgreement Protocol (ACAP) that can be adapted on various network layers, architectures and devices. [VMV16]
- On the State of Crypto Agility: Survey of the current state of Crypto Agility [ASW22]
- On the importance of cryptographic agility for industrial automation: Preparing industrial systems for the quantum computing era: 讨论量子计算机对现代密码学的威胁,从而鼓励对密码敏捷的研究和应用 [PN19]
- Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques:: The paper focusing is on the established cryptographic methods and how current security protocols can be adapted against quantum attacks. [GAB19]
- Post-Quantum Software Updates: In this paper the authors detail the troubles we encountered when using hash-based signatures in practice and study the most important use case for hash-based signatures: software or code signing. [GFL19]
- Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility: 本文尝试更新《Kerberos中初始认证使用的公钥密码》标准(RFC4556),删除了与特定密码算法绑定的协议结构 [AZC19]
- Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems: 该文考虑到道路基础设施管理机构和运输设备制造商的需求,提出了一种用于智能运输的多领域PKI架构 [UWK15]
- Security Agility Solution Independent of the Underlaying Protocol Architecture.: 本文提出“敏捷密码协商协议”(ACNP),这一解决方案的行为与协议所在协议栈层次无关,且具有鲁棒性和密码敏捷性,能够极大改进安全性。 [VM12]
- Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation): 微软开发的下一代密码库,让更换密码算法的过程不需要修改代码 [LLP13]
- Sicherheitsrisiko Quantencomputer: In this publication, the authors cover why quantum computers pose a big problem for todays security. [Q21]
- Systemic Flexibility and Business Agility: This book presents a conceptual framework of the key dimensions of business excellence. [S15]
- The Crypto-Agility Properties: In this paper, the authors discuss the motivations and relate some works and the best practices to achieve crypto- agility. [MO18]
- The Secure Socket API: TLS as an Operating System Service: 本文以标准POSIX套接字API作为载体对简化版TLS API展开探索,同时也让管理员能够按需控制应用程序和修改TLS配置 [OHW18]
- Usability and Security Effects of Code Examples on Crypto APIs: 密码算法的代码示例平台,改进了非安全专家开发的应用的可用性和安全性 [MW18]
- Zur Benutzbarkeit und Verwendung von API-Dokumentationen: 本文给出了良好的安全API需要满足的需求 [HZH20]
- post-quantum crypto agility: Utimaco provides solutions which are quantum proof as well as compliant to industry regulations and combines this with a crypto-agile overall setup, allowing for rapid upgrades to new status quos with low involvement of costs and manpower. [U18]
Last modified June 6, 2022