General
- A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography: Using an FPGA to implement a constant-time SIDH implementation with a security level of approximately 252 bits. [KAK18]
- A Survey on Post-Quantum Cryptography for Constrained Devices: Survey on Post-Quantum Cryptography schemes and their applicability to provide security in constrained devices. [S19]
- Biggest Failures in Security: 信息安全面临的大量问题,以及解决这些问题可能的策略 [AVV19]
- Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware: Overview and motivation for the PQC, NIST Standardization Effort, cryptographic competitions, and hardware benchmarking of candidates in cryptographic contests. [G18]
- Cybersecurity in an era with quantum computers: will we be ready?: Assessment of the risks of quantum computers and their impact on the security of IT systems [M15]
- Eberbacher Gespräch: Next Generation Crypto: Key challenges forthree groups of industry differently involved in cryptography [KNW18]
- Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units: 使用图形处理单元改进基于LWE的密码算法性能 [AS20]
- From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things: 比较了各个PQC算法的性能,并给出物联网环境下PQC面临的挑战 [F20]
- Getting Ready for Post-Quantum Cryptography:: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms: 与使用后量子密码算法相关的挑战 [BPS20]
- Hardware Deployment of Hybrid PQC: 设计了一种混合ECDH和SIKE密钥交换的小型架构,达成量子安全 [AKK21]
- Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility: A wide range of topics and challenges at a high abstraction level grouped into categories of PQC migration and crypto-agility [OPp19]
- Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches: 使用纯硬件和软硬件协同设计方法实现NIST第2轮候选算法,并评估了性能 [DFA20]
- Introduction to post-quantum cryptography: Introduction to post-quantum cryptography [B09]
- Kryptografie quantensicher gestalten: Overview of the recent development in quantum technology and recommendations for migration to quantum resistant cryptography [d21]
- Migration zu Post-Quanten-Kryptografie - Handlungsempfehlungen des BSI: 德国信息安全联邦办公室针对PQC迁移行动的建议 [B20]
- NIST Post-Quantum Cryptography - A Hardware Evaluation Study: 基于硬件的NIST PQC候选算法比较 [BSN19]
- On Feasibility of Post-Quantum Cryptography on Small Devices: 这一工作在不同平台的小型设备上进行了实验性的PQC实现 [MPD18]
- On PQC Migration and Crypto-Agility: 对所发现的挑战和不同领域的解决方案进行了现状综述,让读者入门该学科,了解现状变得更加容易 [WAG21]
- On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions: Applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era [SHK20]
- On the State of Post-Quantum Cryptography Migration: Survey on the current state of the migration process towards PQ-Secure algorithms [AWG21]
- Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors: 对CRYSTALS-Kyber将密钥封装机制的SHA3变体和AES变体进行向量化,性能分别提升了52%和83% [KKP20]
- Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms: Lizard、ring-Lizard、Kyber、Frodo、NewHope等格密码算法和公钥交换协议在JavaScript中的实现 [YXF18]
- Post Quantum Cryptography: Readiness Challenges and the Approaching Storm: Literature-study article about the upcomming threat of quantum computers against the currently widely used cryptography. [CLO21]
- Post-Quantum Crypto for dummies: Introduction to post-quantum cryptography [WNG18]
- Post-Quantum Cryptography and 5G Security: Tutorial: 以建立“准备好应对量子时代”的5G核心网络为目标,给出了同时升级3GPP 5G标准和NIST后量子密码标准的指引 [CMC19]
- Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design: Lattice-based cryptography and its hardware security issues, namely side-channel and fault-based attacks. [BMF21]
- Post-Quantum Secure Boot: 量子安全的引导解决方案。出于安全和性能考虑,完全采用硬件实现 [KGC20]
- Post-quantum cryptography: Literature-study of the ongoing development of PQC-schemes and algorithms as well as the ongoing security-scruitiniering of them. [BL17]
- Practical Post-Quantum Cryptography: 该文是Fraunhofer安全信息技术研究所的白皮书,比较了各个PQC算法,并给出对PQC迁移的挑战应对方法 [NW17]
- Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen: 简要评估了量子密码和后量子密码现状 [HLL21]
- Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges: 给出了密码学的一些重要用例,以及后量子密码迁移可能实施的策略 [CCD15]
- Quantum computers will compromise the security of identity documents: The effects of quantum computers on the securiy of electronic identity documents [E19]
- Report on Post-Quantum Cryptography: NIST Internal Report of the current state of quantum computers and post-quantum cryptography. [CJL16]
- Sicherheitsrisiko Quantencomputer: Recommendations for post-quanum cryptography [A19]
- SoK: Challenges of Post-Quantum Digital Signing in Real-world Applications: Applications’ signing requirements against all 6 NIST’s post-quantum cryptography contest round 3 candidate algorithms [TSZ19]
- Standardisierung von Post-Quanten-Kryptografie und Empfehlungen des BSI: 综述了PQC标准化的现状,并以BSI名义提出建议 [HKW21]
- Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms: 就特殊硬件平台上是否适于实现,评估了NIST候选算法 [MRD20]
Last modified June 6, 2022