Approaches & Strategies
- Biggest Failures in Security: 信息安全面临的大量问题,以及解决这些问题可能的策略 [AVV19]
- Cybersecurity in an era with quantum computers: will we be ready?: Assessment of the risks of quantum computers and their impact on the security of IT systems [M15]
- ETSI - Quantum - Safe Cryptography, Computing Cryptography: The primary objective is to help raise awareness of thepotential impacts of quantum computing on information security globally. This includes a 1) survey of cryptographic principles, 2) the possible impact of quantum computing on their effectiveness 3) what can be done to mitigate the risks in an economically and technically practical manner. [D21]
- Eberbacher Gespräch: Next Generation Crypto: Key challenges forthree groups of industry differently involved in cryptography [KNW18]
- From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things: 比较了各个PQC算法的性能,并给出物联网环境下PQC面临的挑战 [F20]
- Getting Ready for Post-Quantum Cryptography:: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms: 与使用后量子密码算法相关的挑战 [BPS20]
- Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility: A wide range of topics and challenges at a high abstraction level grouped into categories of PQC migration and crypto-agility [OPp19]
- Introduction to post-quantum cryptography: Introduction to post-quantum cryptography [B09]
- Kryptografie quantensicher gestalten: Overview of the recent development in quantum technology and recommendations for migration to quantum resistant cryptography [d21]
- Making Existing Software Quantum Safe: Lessons Learned: This paper covers the effect of quantum computer advantage on existing software systems. [ZMR21]
- Managing Cryptographic and Quantum Risk: This document examines two significant risks facing today’s organizations - cryptographic risk and quantum risk [C20]
- Migration strategies and recommendations to Qantum Safe schemes: This report lays out the importance of getting the role of cryptography and the depth of its integration in business better understood. It focuses three stages: Inventory compilation, preparation of the migration plan and migration execution. [E20]
- Migration zu Post-Quanten-Kryptografie - Handlungsempfehlungen des BSI: 德国信息安全联邦办公室针对PQC迁移行动的建议 [B20]
- On PQC Migration and Crypto-Agility: 对所发现的挑战和不同领域的解决方案进行了现状综述,让读者入门该学科,了解现状变得更加容易 [WAG21]
- On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions: Applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era [SHK20]
- On the State of Post-Quantum Cryptography Migration: Survey on the current state of the migration process towards PQ-Secure algorithms [AWG21]
- PQCRYPTO Post-Quantum Cryptography for Long-Term Security: Discusses ongoing standardization activities in the area of post-quantum cryptography. [B18]
- Post Quantum Cryptography: Readiness Challenges and the Approaching Storm: Literature-study article about the upcomming threat of quantum computers against the currently widely used cryptography. [CLO21]
- Post-Quantum Crypto for dummies: Introduction to post-quantum cryptography [WNG18]
- Post-Quantum Cryptography and 5G Security: Tutorial: 以建立“准备好应对量子时代”的5G核心网络为目标,给出了同时升级3GPP 5G标准和NIST后量子密码标准的指引 [CMC19]
- Post-quantum cryptography: Literature-study of the ongoing development of PQC-schemes and algorithms as well as the ongoing security-scruitiniering of them. [BL17]
- Practical Post-Quantum Cryptography: 该文是Fraunhofer安全信息技术研究所的白皮书,比较了各个PQC算法,并给出对PQC迁移的挑战应对方法 [NW17]
- Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen: 简要评估了量子密码和后量子密码现状 [HLL21]
- Quantum Advantage and the Y2K Bug: A Comparison: To maintain the cryptoagility of software, we must prepare for the era of quantum advantage now [ZMR21]
- Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges: 给出了密码学的一些重要用例,以及后量子密码迁移可能实施的策略 [CCD15]
- Quantum computers will compromise the security of identity documents: The effects of quantum computers on the securiy of electronic identity documents [E19]
- Quantum-Resistant Cryptography: An overview to security experts who do not yet have a deep understanding of quantumresistant cryptography [MST21]
- Report on Post-Quantum Cryptography: NIST Internal Report of the current state of quantum computers and post-quantum cryptography. [CJL16]
- Sicherheitsrisiko Quantencomputer: Recommendations for post-quanum cryptography [A19]
- SoK: Challenges of Post-Quantum Digital Signing in Real-world Applications: Applications’ signing requirements against all 6 NIST’s post-quantum cryptography contest round 3 candidate algorithms [TSZ19]
- SoK: How (not) to Design and Implement Post-quantum Cryptography: Current state of knowledge on post-quantum cryptography. Trends, common methodologies, and pitfalls to look for and recurrent challenges [HPA21]
- Standardisierung von Post-Quanten-Kryptografie und Empfehlungen des BSI: 综述了PQC标准化的现状,并以BSI名义提出建议 [HKW21]
- The Complex Path to Quantum Resistance: Is your organization prepared?: Preparing for the transition from quantum-vulnerable to quantum-resistant technologies [MH21]
- Updates from the Open Quantum Safe Project: The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.In this paper, the authors provide an update on the OQS project. [MVB21]
- Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte: 使用eUCRITE API集成McEliece和SPHINCS+两种PQC算法的最终报告 [ZWH21]
- [Project Description] Migration to Post-Quantum Cryptography (Draft): NCCoE and NIST Project description for PQC migration [BS21]
- [Project Description] Migration to Post-Quantum Cryptography: This paper complements the NIST post-quantum cryptography (PQC) standardization activities. [BSN21]
Last modified June 6, 2022