参考文献

[A.16]

A. Langley. ImperialViolet - CECPQ1 results, 2016.

[AASA+19]

G. Alagic, J. Alperin-Sheriff, D. Apon, D. Cooper, Q. Dang, Y. Liu, C. Miller, D.Moody, R. Peralta, et al.2019.Status report on the first round of the NIST post-quantum cryptography standardization process. US Department of Commerce,National Institute of Standards and Technology

[ABB+20]

E. Alkim, P. S. L. M. Barreto, N. Bindel, J. Krämer, P. Longa, and J. E. Ricardini. The lattice-based digital signature scheme qtesla. In M. Conti, J. Zhou, E. Casalicchio, and A. Spognardi, editors, Applied Cryptography and Network Security, pages 441–460. Springer International Publishing, 2020

[ABB+20]

N. Aragon, P. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, S. Gueron, T. Guneysu, C. A. Melchor, et al.2020. BIKE: bit flipping key encapsulation (22 Oct 2020)

[ABBC10]

T. Acar, M. Belenkiy, M. Bellare, and D. Cash. Cryptographic agility and its relation to circular encryption. 2010.

[ABD+21]

R. Avanzi, J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. M. Schanck,P. Schwabe, G. Seiler, and D. Stehlé. 2021. CRYSTALS-Kyber algorithm specifi-cations and supporting documentation (version 3.01).NIST PQC Round 3(31Jan 2021)

[ABF+17]

Y. Acar, M. Backes, S. Fahl, S. Garfinkel, D. Kim, M. L. Mazurek, and C. Stransky. Comparing the Usability of Cryptographic APIs. In 2017 IEEE Symposium on Security and Privacy (SP), pages 154–171, San Jose, CA, USA, May 2017. IEEE, doi:10.1109/SP.2017.52

[ADPS16]

E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe. Post-quantum key exchange—a new hope. In 25Th {USENIX } security symposium ( {USENIX } security 16), pages 327–343, 2016

[AEK+21]

Azarderakhsh, R., El Khatib, R., Koziel, B., & Langenberg, B. (2021). Hardware Deployment of Hybrid PQC. IACR Cryptol. ePrint Arch., 2021, 541.

[AJO+20]

Alagic G, Jeffery S, Ozols M, Poremba A. On Quantum Chosen-Ciphertext Attacks and Learning with Errors. Cryptography. 2020; 4(1):10. https://doi.org/10.3390/cryptography4010010

[AnKi18]

An, H., & Kim, K. (2018, January). QChain: Quantum-resistant and decentralized PKI using blockchain. In Proc. SCIS (pp. 1-8).

[AnSe20]

An, SangWoo, and Seog Chung Seo. “Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units.” Mathematics 8.10 (2020): 1781.

[AVVY19]

F. Armknecht, I. Verbauwhede, M. Volkamer, and M. Yung, editors. Biggest Failures in Security, volume 9 of Dagstuhl Reports. Dagstuhl Publishing, Nov. 2019.

[AZCH19]

L. Hornquist Astrand, L. Zhu, M. Cullen, and G. Hudson. Public key cryptography for initial authentication in kerberos (PKINIT) algorithm agility. 2019. RFC 8636.

[BBC+20]

D. Bernstein, B. Brumley, M. Chen, C. Chuengsatiansup, T. Lange, A. Marotzke, N. Tuveri, C. van Vredendaal, and B. Yang. Ntru prime: round 3 20201007. 2020

[BBC+21]

G. Banegas, D. J. Bernstein, F. Campos, T. Chou, T. Lange, M. Meyer, B. Smith and J. Sotáková. CTIDH: faster constant-time CSIDH. 2021. Cryptology ePrint Archive, Report 2021/633

[BBG+19]

Bindel, N., Braun, J., Gladiator, L., Stöckert, T., & Wirth, J. (2019). X. 509-compliant hybrid certificates for the post-quantum transition. Journal of Open Source Software, 4(40), 1606

[BHK+19]

D. J. Bernstein, A. Hülsing, S. Kölbl, R. Niederhagen, J. Rijneveld, and P. Schwabe. The sphincs+ signature framework. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19, page 2129–2146, New York, NY, USA, 2019. Association for Computing Machinery. doi:10.1145/3319535.3363229

[BKS19]

L. Botros, M. J. Kannwischer, and P. Schwabe. Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. In J. Buchmann and T. Nitaj, A.and Rachidi, editors, Progress in Cryptology – AFRICACRYPT 2019, volume 11627, pages 209–228. Springer International Publishing, Cham, 2019. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-030-23696-0_11

[BPS21]

Barker, W., Polk, W., & Souppaya, M. (2021). Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms (pp. 10-10). National Institute of Standards and Technology

[Bra16]

M. Braithwaite. Experimenting with post-quantum cryptography, 2016.

[BRP20]

F. Borges, P. R. Reis and D. Pereira, “A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography,” in IEEE Access, vol. 8, pp. 142413-142422, 2020, doi: 10.1109/ACCESS.2020.3013250.

[BSI20]

BSI. 2020. Migration zu Post-Quanten-Kryptografie.

[BSKNS20]

K. Bürstinghaus-Steinbach, C. Krauß, R. Niederhagen, and M. Schneider. 2020.Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyberand SPHINCS+ with Mbed TLS. InProceedings of the 15th ACM Asia Conferenceon Computer and Communications Security (ASIA CCS ’20). Association forComputing Machinery, 841–852

[BSNK19]

K. Basu, D. Soni, M. Nabeel, and R. Karri. 2019. NIST Post-Quantum Cryptography - A Hardware Evaluation Study

[CaCr21]

Campagna, M., & Crockett, E. (2019). Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). Internet Engineering Task Force, Internet-Draft draft-campagna-tls-bike-sike-hybrid, 6

[Cam19]

Campbell Sr, R. (2019). Evaluation of post-quantum distributed ledger cryptography. The Journal of The British Blockchain Association, 2(1), 7679.

[CCA+21]

S. Chowdhury, A. Covic, R. Y. Acharya, S. Dupee, and D. Ganji, F.and Forte. Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physi- cally unclonable functions. Journal of Cryptographic Engineering, February 2021.

[CCD+15]

M. Campagna, L. Chen, O. Dagdelen, J. Ding, J Fernick, N. Gisin, D. Hayford, T. Jennewein, N. Lütkenhaus, and M. Mosca. 2015.Quantum SafeCryptography and Security: An introduction, benefits, enablers and chal-lenges.European Telecommunications Standards InstituteETSI White Paper,8 (June 2015), 1–64.

[CCH+20]

M. Campagna, C. Costello, B. Hess, A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, J. Renes, D. Urbanik, et al. Supersingular isogeny key encapsulation. 2020

[CCU+20]

T. Chou, C. Cid, S. UiB, J. Gilcher, T. Lange, V. Maram, R. Misoczki, R. Niederhagen, K. G Paterson, Edoardo P., et al. Classic mceliece: conservative code-based cryptography 10 october 2020. 2020

[CDG+17]

Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., … & Zaverucha, G. (2017, October). Post-quantum zero-knowledge and signatures from symmetric-key primitives. In Proceedings of the 2017 acm sigsac conference on computer and communications security (pp. 1825-1842)

[CDH+19]

C. Chen, O. Danba, J. Hoffstein, A. Hülsing, J. Rijneveld, J. M Schanck, P. Schwabe, W. Whyte, and Z. Zhang. Ntru algorithm specifications and supporting documentation. Round-3 submission to the NIST PQC project, March 2019

[CDF+21]

Cremers, C., Düzlü, S., Fiedler, R., Fischlin, M., & Janson, C. (2021). BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. In Proceedings of the 42nd IEEE Symposium on Security and Privacy (S&P'21). IEEE Press.

[ChCh21]

Chen, Ming-Shing, and Tung Chou. “Classic McEliece on the ARM Cortex-M4.” IACR Cryptol. ePrint Arch. 2021 (2021): 492.

[ChSe21]

Cho, J. Y., & Sergeev, A. (2021). Post-quantum MACsec in Ethernet Networks. Journal of Cyber Security and Mobility, 161-176.

[CFP+19]

Casanova, J. C. Faugere, G. M. R. J. Patarin, L. Perret, and J. Ryckeghem.2019. GeMSS: a great multivariate short signature.Submission to NIST PQCcompetition Round-2(2019)

[CJL+16]

L. Chen, S. Jordan, Y. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone.2016.Report on post-quantum cryptography. Vol. 12. US Department of Com-merce, National Institute of Standards and Technology

[CMC19]

Clancy, T. C., McGwier, R. W., & Chen, L. (2019, May). Post-quantum cryptography and 5G security: tutorial. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (pp. 285-285).

[CPS19]

E. Crockett, C. Paquin, and D. Stebila. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. 2019.

[CU16]

L. Chen and R. Urian. Algorithm agility – discussion on TPM 2.0 ECC functionalities. In L. Chen, D. McGrew, and C. Mitchell, editors, Security Standardisation Research, volume 10074, pages 141–159. Springer Inter-national Publishing, 2016

[DDS+20]

J. Ding, J. Deaton, K. Schmidt, Vishakha, and Z. Zhang. Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme. In D. Micciancio and T. Ristenpart, editors, Advances in Cryptology – CRYPTO 2020, pages 279–298, Cham, 2020. Springer International Publishing.

[DDW20]

Z. Ding, J.and Zhang, J. Deaton, and L. Wang. A complete crypt- analysis of the post-quantum multivariate signature scheme himq- 3. In International Conference on Information and Communica- tions Security, pages 422–440. Springer, 2020.

[DFA+20]

V. Ba Dang, F. Farahmand, M. Andrzejczak, K. Mohajerani, D. T. Nguyen, andK. Gaj. 2020. Implementation and benchmarking of round 2 candidates in the nist post-quantum cryptography standardization process using hardware andsoftware/hardware co-design approaches.Cryptology ePrint Archive: Report2020/795(2020)

[DHP20]

B. Dowling, T. Brandt Hansen, and K. G. Paterson. Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange. In PQCrypto 2020, 2020.

[DKL+21]

L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D.Stehlé. 2021. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation.Round-3 submission to the NIST PQC project(8 Feb 2021)

[DKR+19]

J. D’Anvers, A. Karmakar, S. Roy, F. Vercauteren, J. Mera, A. Bass, and M. Beirendonck. Saber: Mod-lwr based kem: Round 3 submission. In NIST Post-Quantum Cryptography Standardization: Round 3, 2019

[DLW19]

X. Dong, Z. Li, and X. Wang. Quantum cryptanalysis on some generalized Feistel schemes. Science China Information Sciences, 62(2):22501, February 2019.

[DS05]

J. Ding and D. Schmidt. Rainbow, a new multivariable polynomial signature scheme. In International Conference on Applied Cryptography and Network Security, pages 164–175. Springer, 2005

[FC20]

Tiago M. Fernández-C. 2020. From Pre-Quantum to Post-Quantum IoT Security:A Survey on Quantum-Resistant Cryptosystems for the Internet of Things.IEEEInternet of Things Journal7, 7 (2020), 6457–6480

[FHK+20]

P. A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, T.Ricosset, G. Seiler, W. Whyte, and Z. Zhang. 2020. Falcon: Fast-fourier lattice-based compact signatures over NTRU specifications v1. 2.NIST Post-Quantum Cryptography Standardization Round3 (2020)

[FMK19]

Fluhrer, S., McGrew, D., Kampanakis, P., & Smyslov, V. (2019). Postquantum preshared keys for IKEv2. Internet Engineering Task Force, Internet-Draft draft-ietf-ipsecme-qr-ikev2-11.

[GHK+21]

Gonzalez, Ruben, Andreas Hülsing, Matthias J. Kannwischer, Juliane Krämer, Tanja Lange, Marc Stöttinger, Elisabeth Waitz, Thom Wiggers, and Bo-Yin Yang. “Verifying Post-Quantum Signatures in 8 kB of RAM.” (2021).

[GKT13]

R. Gagliano, S. Kent, and S. Turner. Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI). Request for Comments. 2013. RFC 6916.

[GMP21]

Grubbs, Paul, Varun Maram, and Kenneth G. Paterson. Anonymous, Robust Post-Quantum Public Key Encryption. Cryptology ePrint Archive, Report 2021/708, 2021. h ps://eprint. iacr. org/2021/708. 1, 5, 7, 13, 14, 2021.

[GoKa15]

Ghosh, S., & Kate, A. (2015, June). Post-quantum forward-secure onion routing. In International Conference on Applied Cryptography and Network Security (pp. 263-286). Springer, Cham

[Hei19]

Exchange, Quantum-Resistant Key. “Towards a Verifiably Secure Quantum-Resistant Key Exchange in IKEv2.”

[HKW21]

[H . Hagemeier, S. Kousidis, and T. Wunderer. Standardisierung von post-quanten-kryptografie und empfehlungen des bsi. In German Federal Office for Information Security (BSI), editor, Tagungsband zum 17. Deutschen IT-Sicherheitskongress, page 382–294. SecuMedia Verlag, Ingelheim, Germany, Feb 2021. Note: No direct link available!]

[HLL+21]

T. Hemmert, M. Lochter, D. Loebenberger, M. Margraf, S. Reinhardt, and G.Sigl. 2021. Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen. InTagungsband zum 17. Deutschen IT-Sicherheitskongress, German Federal Office for Information Security (BSI) (Ed.). SecuMedia Verlag,Ingelheim, Germany, 367–380

[HM19]

S. Udyani H. Mudiyanselage. Next-generation web public-key infrastructure technologies, 2019. doi:10.5204/thesis.eprints.128643.

[Hou15]

R. Housley. Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms. RFC 7696, 2015.

[HPA21]

Howe, J., Prest, T., & Apon, D. (2021). SoK: How (not) to Design and Implement Post-Quantum Cryptography. IACR Cryptol. ePrint Arch., 2021, 462.

[HPDM20]

A. Holcomb, G. C. C. F. Pereira, B. Das, and M. Mosca. PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks. arXiv:2010.06571

[HNS+20]

Hülsing, A., Ning, K. C., Schwabe, P., Weber, F., & Zimmermann, R. (2020). Post-quantum WireGuard. IACR Cryptol. ePrint Arch., 2020, 379.

[HZHW20]

R. Huesmann, A. Zeier, A. Heinemann, and A. Wiesmaier. Zur Benutzbarkeit und Verwendung von API-Dokumentationen. In Christian Hansen, Andreas Nürnberger, and Bernhard Preim, editors, Mensch und Computer 2020 - Workshopband, Bonn, 2020. Gesellschaft für Informatik e.V. doi:10.18420/muc2020-ws119-002.

[JS19]

S. Jaques and J. M. Schanck. Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE. In A. Boldyreva and D. Micciancio, editors, Advances in Cryptology – CRYPTO 2019, volume 11692, pages 32–61. Springer International Publish- ing, 2019.

[KAMJ17]

B. Koziel, R. Azarderakhsh, M. Mozaffari Kermani, and D. Jao. 2017. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves.IEEETransactions on Circuits and Systems I: Regular Papers64, 1 (Jan. 2017), 86–99

[Kam+20]

Panos Kampanakis and Douglas Steblia and Markus Friedl and Torben Hansen and Dimitrios Sikeridis. 2020. Post-quantum public key algorithms for the Secure Shell (SSH) protocol, 0 Internet-Draft. Internet Engineering Task Force

[KaSi19]

P. Kampanakis and D. Sikeridis. 2019.Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. Technical Report 1276

[KGC+20]

V. B. Y. Kumar, N. Gupta, A. Chattopadhyay, M. Kasper, C. Krauß, and R. Nieder-hagen. 2020. Post-Quantum Secure Boot. In2020 Design, Automation Test inEurope Conference Exhibition (DATE). 1582–1585 doi:10.23919/DATE48585.2020.9116252

[KiKw18]

Kiefer, Franziskus, and Krzysztof Kwiatkowski. “Hybrid ECDHE-SIDH key exchange for TLS.” draft-kiefer-tls-ecdhe-sidh-00 (work in progress) (2018).

[KKP20]

S. Koteshwara, M. Kumar, and P. Pattnaik. 2020. Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors.In2020 IEEE International Symposium on Performance Analysis of Systems andSoftware (ISPASS). 223–225

[KKS+20]

A. Kuznetsov, A. Kiian, O. Smirnov, A. Cherep, M. Kanabekova, and I. Chepurko. Testing of Code-Based Pseudorandom Num- ber Generators for Post-Quantum Application. In 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT), pages 172–177, 2020.

[KOV+18]

A. Khalid, T. Oder, F. Valencia, M. O’ Neill, T. Güneysu, and F. Regazzoni. Physical protection of lattice-based cryptography: Challenges and solutions. In Proceedings of the 2018 on Great Lakes Symposium on VLSI, pages 365–370. ACM, 2018.

[KPDG18]

P. Kampanakis, P. Panburana, E. Daw, and D. Van Geest. 2018. The Viability of Post-quantum X.509 Certificates.IACR Cryptol. ePrint Arch.2018 (2018)

[KSL+19]

K. Kwiatkowski, N. Sullivan, A. Langley, D. Levin, and A. Mislove. 2019. Measuring TLS key exchange with post-quantum KEM. InWorkshop Record of the SecondPQC Standardization Conference

[KV19]

K. Kwiatkowski and L. Valenta. The TLS Post-Quantum Experiment, October 2019.

[KwVa19]

K. Kwiatkowski and L. Valenta. 2019. The TLS Post-Quantum Experiment

[Lang19]

A. Langley. 2019. Real-world measurements of structured-lattices and supersin-gular isogenies in TLS

[LLP+13]

K. Lee, Y. Lee, J. Park, K. Yim and I. You, “Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation),” 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013, pp. 709-713, doi: 10.1109/IMIS.2013.128

[LLJ20]

Lohachab, A., Lohachab, A., & Jangra, A. (2020). A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet of Things, 9, 100174.

[MAA+20]

D. Moody, G. Alagic, D. C Apon, D. A. Cooper, Q. H. Dang, J. M. Kelsey, Y.Liu, C. A. Miller, R. C. Peralta, R. A. Perlner, A. Y. Robinson, D. C. Smith-Tone,and J. Alperin-Sheriff. 2020. Status report on the second round of the NISTpost-quantum cryptography standardization process.

[MAB+21]

C. Aguilar Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, E. Persichetti, G. Zémor, and I. C. Bourges. Hamming quasi-cyclic (hqc). NIST PQC Round, 3, 2021

[Mas02]

S. Maseberg. Fail-Safe-Konzept für Public-Key-Infrastrukturen. PhDthesis, 2002.

[MdJvH+20]

M. Müller, J. de Jong, M. van Heesch, B. Overeinder, and R. van Rijswijk-Deij. Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC. 50(4):49–57, 2020. doi:10.1145/3431832.3431838.

[MPD+18]

L. Malina, L. Popelova, P. Dzurenda, J. Hajny, and Z. Martinasek. 2018. On Feasibility of Post-Quantum Cryptography on Small Devices (15th IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018), Vol. 51. 462–467

[MRD+20]

L. Malina, S. Ricci, P. Dzurenda, D. Smekal, J. Hajny, and T. Gerlich. 2020. Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms. In Innovative Security Solutions for Information Technology and Communications. Springer International Publishing, 109–124

[MW18]

K. Mindermann and S. Wagner. Usability and Security Effects of Code Examples on Crypto APIs. In 2018 16th Annual Conference on Privacy, Security and Trust (PST), pages 1–2. IEEE, August 2018.

[MW20]

K. Mindermann and S. Wagner. 2020. Fluid Intelligence Doesn’t Matter! Effectsof Code Examples on the Usability of Crypto APIs. In2020 IEEE/ACM 42ndInternational Conference on Software Engineering: Companion Proceedings (ICSE-Companion). 306–307.

[NAB+21]

M. Naehrig, E. Alkim, J. W Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa,I. Mironov, V. Nikolaenko, C. Peikert, et al.2020. Frodokem learning with errorskey encapsulation.NIST PQC Round3 (2021)

[NIWA17]

Niederhagen, R., & Waidner, M. (2017). Practical Post-Quantum Cryptography. Fraunhofer White Paper, vol. ISSN, 2192-8169

[NWAO19]

M. D. Noel, O. V. Waziri, M. S. Abdulhamid, and A. J. Ojeniyi. Stateful hash-based digital signature schemes for bitcoin cryptocurrency. In 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), pages 1–6, 2019.

[NWE19]

A. Neish, T. Walter, and P. Enge. Quantum-resistant authentication algorithms for satellite-based augmentation systems. Navigation, 66(1):199–209, 2019.

[OHW+18]

M. O’Neill, S. Heidbrink, J. Whitehead, T. Perdue, L. Dickinson, T. Collett, N. Bonner, K. Seamons, and D. Zappala. The Secure Socket API: TLS as an Operating System Service. In 27th USENIX Security Symposium (USENIX Security 18), pages 799–816. USENIX Association, 2018.

[OP20]

M. Ounsworth and M. Pala. Composite Keys and Signatures For Use In Internet PKI. Internet-Draft-ounsworth-pq-composite-sigs-03, Internet Engineering Task Force, July 2020. Backup Publisher: Internet Engineering Task Force Num Pages: 18

[OPP19]

D. Ott, C. Peikert, and participants. 2019. Identifying Research Challengesin Post Quantum Cryptography Migration and Cryptographic Agility. (Sept.2019).

[PASC20]

S. Paul and P. Scheible. 2020. Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication. InComputerSecurity – ESORICS 2020. Vol. 12309. Springer International Publishing, 295–316

[PN19]

S. Paul and M. Niethammer. On the importance of cryptographic agility for industrial automation. at - Automatisierungstechnik, 67(5):402–416, May 2019, doi:10.1515/auto-2019-0019

[PRKK19]

S. Pugh, M. S. Raunak, D. R. Kuhn, and R. Kacker. Systematic Testing of Post-Quantum Cryptographic Implementations Using Metamorphic Testing. In 2019 IEEE/ACM 4th International Workshop on Metamorphic Testing (MET), pages 2–8, Montreal, QC, Canada, May 2019. IEEE, doi:10.1109/MET.2019.00009.

[PS20]

S. Paul and P. Scheible. Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communica tion. In L. Chen, N. Li, K. Liang, and S. Schneider, editors, Computer Security – ESORICS 2020, volume 12309, pages 295–316. Springer In ternational Publishing, 2020. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-030-59013-0_15.

[PST13]

R. Perlner and D. Smith-Tone. A classification of differential invariants for multivariate post-quantum cryptosystems. In P. Gaborit, editor, Post- Quantum Cryptography, volume 7932, pages 165–173. Springer Berlin Heidelberg, 2013. Series Title: Lecture Notes in Computer Science. doi:10.1007/ 978-3-642-38616-9_11

[PST19]

[C. Paquin, D. Stebila, and G. Tamvada. 2019.Benchmarking Post-QuantumCryptography in TLS. Technical Report 1447] (http://eprint.iacr.org/2019/1447)

[ScSt17]

Schanck, John M., and Douglas Stebila. “A Transport Layer Security (TLS) extension for establishing an additional shared secret.” IETF Draft (2017).

[SFG20]

Steblia, D., Fluhrer, S. and Gueron, S., 2020. Hybrid key exchange in TLS 1.3. Internet-Draft draft-ietf-tls-hybrid-design-02. Internet Engineering Task Force.

[SKD20]

D. Sikeridis, P. Kampanakis, and M. Devetsikiotis. 2020. Post-Quantum Authentication in TLS 1.3: A Performance Study. Technical Report 071

[SM16]

D. Stebila and M. Mosca. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In R. Avanzi and H. Heys, editors, Selected Areas in Cryptography – SAC 2016, Lecture Notes in Computer Science, pages 14–37, Cham, 2016. Springer International Publishing. doi:10.1007/978-3-319-69453-5_2.

[SSPB19]

S. Samardjiska, P. Santini, E. Persichetti, and G. Banegas. A reaction attack against cryptosystems based on LRPC codes. In P. Schwabe and N. Thériault, editors, Progress in Cryptology – LATINCRYPT 2019, pages 197–216. Springer International Pub- lishing, 2019.

[SSW20]

Peter Schwabe, Douglas Stebila, and Thom Wiggers. 2020. Post-Quantum TLS Without Handshake Signatures. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ‘20). Association for Computing Machinery, New York, NY, USA, 1461–1480. DOI:https://doi.org/10.1145/3372297.3423350

[StMo16]

D. Stebila and M. Mosca. 2016. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In Selected Areas in Cryptography – SAC2016, R. Avanzi and H. Heys (Eds.). Springer International Publishing, 14–37

[SWZ16]

Schanck, John M., William Whyte, and Zhenfei Zhang. “Quantum-safe hybrid (QSH) ciphersuite for Transport Layer Security (TLS) version 1.2.” IETF, Internet-Draft draft-whyte-qsh-tls (2016)

[TKY21]

Chou, Tung, Matthias J. Kannwischer, and Bo-Yin Yang. “Rainbow on Cortex-M4.” IACR Cryptol. ePrint Arch. 2021 (2021): 532.

[TLW19]

J. Tian, J. Lin, and Z. Wang. 2019. Ultra-Fast Modular Multiplication Implementa-tion for Isogeny-Based Post-Quantum Cryptography. In2019 IEEE InternationalWorkshop on Signal Processing Systems (SiPS). 97–102 doi:10.1109/SiPS47522.2019.9020384

[TRH+20]

Tujner, Z., Rooijakkers, T., van Heesch, M., & Önen, M. (2020). QSOR: Quantum-Safe Onion Routing. arXiv preprint arXiv:2001.03418

[Unr20]

Unruh, D. (2020, December). Post-quantum verification of Fujisaki-Okamoto. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 321-352). Springer, Cham.

[UWK15]

M. Ullmann, C. Wieschebrink, and D. Kügler. Public key infrastructure and crypto agility concept for intelligent transportation systems. In Sulc, Noll (Eds.): VEHICULAR 2015: The Fourth International Conference on Advances in Vehicular Systems, Technologies and Applications. October 11-16, 2015, St. Julians, Malta, pages 14 – 19, 2015.

[vHAA+19]

van Heesch, M., van Adrichem, N. L., Attema, T., & Veugen, T. (2019). Towards Quantum-Safe VPNs and Internet. IACR Cryptol. ePrint Arch., 2019, 1277.

[VBDK+20]

M. Van Beirendonck, J. P. D’Anvers, A. Karmakar, J. Balasch, and I. Verbauwhede. A side-channel resistant implementation of saber. IACR Cryptol. ePrint Arch, 733, 2020.

[VM12]

V. Vasić and M. Mikuc. Security Agility Solution Independent of the Underlaying Protocol Architecture. In AT, 918 of CEUR Workshop Proceedings, pages 128–137. CEUR-WS.org, 2012.

[WAG+21]

Wiesmaier, A., Alnahawi, N., Grasmeyer, T., Geißler, J., Zeier, A., Bauspieß, P., & Heinemann, A. (2021). On PQC Migration and Crypto-Agility. arXiv preprint arXiv:2106.09599.

[WaSt20]

Wang, W., & Stöttinger, M. (2020). Post-Quantum Secure Architectures for Automotive Hardware Secure Modules. IACR Cryptol. ePrint Arch., 2020, 26

[WiSo21]

Barker, William, and Murugiah Souppaya. [Project Description] Migration to Post-Quantum Cryptography (Draft). National Institute of Standards and Technology, 2021.

[Wh+17]

Whyte, William, et al. “Quantum-safe hybrid (QSH) key exchange for Transport Layer Security (TLS) version 1.3.” IETF Draft (2017)

[WvdG20]

D. Weller and R. van der Gaag. 2020. Incorporating post-quantum cryptographyin a microservice environment. (2020), 36

[Xag21]

Keita Xagawa. NTRU leads to Anonymous, Robust Public-Key Encryption. Cryptology ePrint Archive, Report 2021/741. 2021

[YXF+18]

Yuan, Y., Xiao, J., Fukushima, K., Kiyomoto, S., & Takagi, T. (2018). Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. Security and Communication Networks, 2018.

[Zei20]

A. Zeier. 08.12.2020. eucrite 1.0 API.

[ZGF20]

D. Zoni, A. Galimberti and W. Fornaciari, “Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography,” in IEEE Access, vol. 8, pp. 163419-163433, 2020, doi: 10.1109/ACCESS.2020.3020262.

[Zim15]

Zimmer, Dipl-Inf Ephraim. “Post-Quantum Kryptographie für IPsec.” Sicherheit in vernetzten Systemen-22. DFN-Konferenz. Ed. by Christian Paulsen. DFN-CERT. 2015.

[ZWH19]

A. Zeier, A. Wiesmaier, and A. Heinemann. API Usability of Stateful Signature Schemes. In The 14th International Workshop on Security (IWSEC), LNCS 11689, pages 1–20. Springer Switzerland, August 2019

[ZWH21]

A. Zeier, A. Wiesmaier, and A. Heinemann. Zur Integration von Post-Quantum Verfahren in bestehende Softwarepodukte. In German Federal Office for Information Security (BSI), editor, Tagungsband zum 17. Deutschen IT-Sicherheitskongress, pages 381 – 391. SecuMedia Verlag, Ingelheim, Germany, March 2021.

[ZYD+20]

F. Zhang, B. Yang, X. Dong, S. Guilley, Z. Liu, W. He, F. Zhang, and K. Ren. Side-Channel Analysis and Countermeasure Design on ARM- based Quantum-Resistant SIKE. IEEE Transactions on Computers, pages 1–1, 2020. Conference Name: IEEE Transactions on Computers. doi: 10.1109/TC.2020.3020407.

[A19]

AG KPMG. 2019. Sicherheitsrisiko Quantencomputer

[A20]

Aumasson Jean-Philippe. 2020. SPHINCS+ Submission to the NIST post-quantum project, v.3

[A21]

Avanzi Roberto. 2021. CRYSTALS-Kyber Algorithm Specifications And Supporting Documentation(version 3.01)

[AAA+19]

Alagic Gorjan, Alperin-Sheriff Jacob, Apon Daniel, Cooper David, Dang Quynh, Liu Yi-Kai, Miller Carl, Moody Dustin, Peralta Rene, Perlner Ray, Robinson Angela, Smith-Tone Daniel. 2019. Status report on the first round of the NIST post-quantum cryptography standardization process

[ABB+10]

Acar Tolga, Belenkiy Mira, Bellare Mihir, Cash David. 2010. Cryptographic Agility and Its Relation to Circular Encryption

[ABB+20]

Alkim Erdem, Barreto Paulo S. L. M., Bindel Nina, Krämer Juliane, Longa Patrick, Ricardini Jefferson E.. 2020. The Lattice-Based Digital Signature Scheme qTESLA

[ABC+19]

Andrikos Christos, Batina Lejla, Chmielewski Lukasz, Lerman Liran, Mavroudis Vasilios, Papagiannopoulos Kostas, Perin Guilherme, Rassias Giorgos, Sonnino Alberto. 2019. Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages

[ABE+21]

Aranha Diego F., Berndt Sebastian, Eisenbarth Thomas, Seker Okan, Takahashi Akira, Wilke Luca, Zaverucha Greg. 2021. Side-Channel Protections for Picnic Signatures

[ABF+17]

Acar Yasemin, Backes Michael, Fahl Sascha, Garfinkel Simson, Kim Doowon, Mazurek Michelle L., Stransky Christian. 2017. Comparing the Usability of Cryptographic APIs

[ABG+19]

Aragon Nicolas, Blazy Olivier, Gaborit Philippe, Hauteville Adrien, Zémor Gilles. 2019. Durandal: A Rank Metric Based Signature Scheme

[ABL+17]

Aggarwal Divesh, Brennen Gavin, Lee Troy, Santha Miklos, Tomamichel Marco. 2017. Quantum Attacks on Bitcoin, and How to Protect Against Them

[ACC+21]

Alkim Erdem, Cheng Dean Yun-Li, Chung Chi-Ming Marvin, Evkan Hülya, Huang Leo Wei-Lun, Hwang Vincent, Li Ching-Lin Trista, Niederhagen Ruben, Shih Cheng-Jhih, Wälde Julian, Yang Bo-Yin. 2021. Polynomial Multiplication in NTRU Prime

[ACD+18]

Albrecht Martin R., Curtis Benjamin R., Deo Amit, Davidson Alex, Player Rachel, Postlethwaite Eamonn W., Virdia Fernando, Wunderer Thomas. 2018. Estimate All the \LWE, NTRU\ Schemes!

[ACD19]

Alwen Joël, Coretti Sandro, Dodis Yevgeniy. 2019. The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol

[ACL+20]

Amiet Dorian, Curiger Andreas, Leuenberger Lukas, Zbinden Paul. 2020. Defeating NewHope with a Single Trace.

[ACZ18]

Amiet Dorian, Curiger Andreas, Zbinden Paul. 2018. FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256

[ADG+19]

Apon Daniel, Dachman-Soled Dana, Gong Huijing, Katz Jonathan. 2019. Constant-Round Group Key Exchange from the Ring-LWE Assumption

[ADP+16]

Alkim Erdem, Ducas Léo, Pöppelmann Thomas, Schwabe Peter. 2016. Post-quantum Key Exchange—A New Hope

[ADP18]

Albrecht Martin R., Deo Amit, Paterson Kenneth G.. 2018. Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

[AFJ14]

Azarderakhsh Reza, Fishbein Dieter, Jao David. 2014. Efficient Implementations of A Quantum-Resistant Key-Exchange Protocol on Embedded systems

[AHH+18]

Albrecht Martin R., Hanser Christian, Hoeller Andrea, Pöppelmann Thomas, Virdia Fernando, Wallner Andreas. 2018. Implementing RLWE-based Schemes Using an RSA Co-Processor

[AJO+20]

Alagic Gorjan, Jeffery Stacey, Ozols Maris, Poremba Alexander. 2020. On Quantum Chosen-Ciphertext Attacks and Learning with Errors

[AK18]

An Hyeongcheo, Kim Kwangjo. 2018. QChain: Quantum-resistant and Decentralized PKI using Blockchain

[AKK+21]

Azarderakhsh Reza, Khatib Rami El, Koziel Brian, Langenberg Brandon. 2021. Hardware Deployment of Hybrid PQC

[ALC+21]

Allende Marcos, León Diego, Cerón Sergio, Leal Antonio, Pareja Adrián, Silva Marcelo, Pardo Alejandro, Jones Duncan, Worrall David, Merriman Ben, Gilmore Jonathan, Kitchener Nick, Venegas-Andraca Salvador. 2021. Quantum-resistance in blockchain networks

[AMD+21]

Abdulgadir Abubakr, Mohajerani Kamyar, Dang Viet, Kaps Jens-Peter, Gaj Kris. 2021. A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks

[AMP+20]

Apon Daniel, Moody Dustin, Perlner Ray A, Smith-Tone Daniel, Verbel Javier A. 2020. Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme.

[AMW19]

Appelbaum Jacob, Martindale Chloe, Wu Peter. 2019. Tiny WireGuard Tweak

[ANI+19]

Akiyama Koichiro, Nakamura Shuhei, Ito Masaru, Hirata-Kohno Noriko. 2019. A key exchange protocol relying on polynomial maps

[AOT+20]

Aranha Diego F., Orlandi Claudio, Takahashi Akira, Zaverucha Greg. 2020. Security of Hedged Fiat–Shamir Signatures Under Fault Attacks

[APS15]

Albrecht Martin R., Player Rachel, Scott Sam. 2015. On the concrete hardness of Learning with Errors

[AR21]

Askeland Amund, Rønjom Sondre. 2021. A Side-Channel Assisted Attack on NTRU

[AS15]

Aysu Aydin, Schaumont Patrick. 2015. Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms

[AS20]

An SangWoo, Seo Seog Chung. 2020. Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units

[ASW+22]

Alnahawi N., Schmitt N., Wiesmaier A., Graßmeyer A. Heinemann T.. 2022. On the State of Crypto Agility

[ATK+19]

AbdelHafeez Mahmoud, Taha Mostafa, Khaled Elsayed Esam M., AbdelRaheem Mohamed. 2019. A Study on Transmission Overhead of Post Quantum Cryptography Algorithms in Internet of Things Networks

[ATT+18]

Aysu Aydin, Tobah Youssef, Tiwari Mohit, Gerstlauer Andreas, Orshansky Michael. 2018. Horizontal side-channel vulnerabilities of post-quantum key exchange protocols

[AVV+19]

Armknecht Frederik, Verbauwhede Ingrid, Volkamer Melanie, Yung Moti. 2019. Biggest Failures in Security

[AWD+21]

Alkim Erdem, W. Bos Joppe, Ducas Léo, Longa Patrick, Mironov Ilya, Naehrig Michael, Nikolaenko Valeria, Peikert Chris, Raghunathan Ananth, Stebila Douglas. 2021. FrodoKEM - Learning With Errors Key Encapsulation

[AWG+21]

Alnahawi Nouri, Wiesmaier Alexander, Grasmeyer Tobias, Geißler Julian, Bauspieß Pia, Heinemann Andreas. 2021. On the State of Post-Quantum Cryptography Migration

[AZC+19]

Astrand L. Hornquist, Zhu L., Cullen M., Hudson G.. 2019. Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility

[B09]

Bernstein Daniel J.. 2009. Introduction to post-quantum cryptography

[B10]

Bernstein Daniel J.. 2010. Grover vs. McEliece

[B16]

Braithwaite Matt. 2016. Experimenting with Post-Quantum Cryptography

[B18]

Bernstein Daniel. 2018. PQCRYPTO Post-Quantum Cryptography for Long-Term Security

[B19]

Buchmann Nicolas. 2019. Strengthening trust in the identity life cycle: Enhancing electronic machine readable travel documents due to advances in security protocols and infrastructure

[B20]

Bernstein Daniel J. 2020. NTRU Prime: Round 3

[B21]

Bernstein Daniel J.. 2021. Fast verified post-quantum software, part 1: RAM subroutines

[BB21]

Bardet Magali, Briaud Pierre. 2021. An algebraic approach to the Rank Support Learning problem

[BBC+21]

Bernstein Daniel J, Brumley Billy Bob, Chen Ming-Shing, Tuveri Nicola. 2021. OpenSSLNTRU: Faster post-quantum TLS key exchange

[BBF+19]

Bindel Nina, Brendel Jacqueline, Fischlin Marc, Goncalves Brian, Stebila Douglas. 2019. Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange

[BBG+19]

Bindel Nina, Braun Johannes, Gladiator Luca, Stöckert Tobias, Wirth Johannes. 2019. X.509-Compliant Hybrid Certificates for the Post-Quantum Transition

[BBK16]

Bindel Nina, Buchmann Johannes, Krämer Juliane. 2016. Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks

[BBP+21]

Barenghi Alessandro, Biasse Jean-François, Persichetti Edoardo, Santini Paolo. 2021. LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action.

[BBR16]

Buchmann Dr Johannes, Bindel Nina, Rieß Susanne. 2016. An Analysis of Lattice-Based Key Exchange Protocols

[BBR18]

Bindel Nina, Buchmann Johannes, Rieß Susanne. 2018. Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols

[BC20]

Banerjee Utsav, Chandrakasan Anantha P.. 2020. Efficient Post-Quantum TLS Handshakes using Identity-Based Key Exchange from Lattices

[BC21]

Bombar Maxime, Couvreur Alain. 2021. Decoding supercodes of Gabidulin codes and applications to cryptanalysis

[BCD+16]

Bos Joppe, Costello Craig, Ducas Leo, Mironov Ilya, Naehrig Michael, Nikolaenko Valeria, Raghunathan Ananth, Stebila Douglas. 2016. Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE

[BCG+07]

Baldi M., Chiaraluce F., Garello R., Mininni F.. 2007. Quasi-Cyclic Low-Density Parity-Check Codes in the McEliece Cryptosystem

[BCG+09]

Berger Thierry P., Cayrel Pierre-Louis, Gaborit Philippe, Otmani Ayoub. 2009. Reducing Key Length of the McEliece Cryptosystem

[BCM21]

Behnia Rouzbeh, Chen Yilei, Masny Daniel. 2021. On Removing Rejection Conditions in Practical Lattice-Based Signatures

[BCN+14]

Bos Joppe W., Costello Craig, Naehrig Michael, Stebila Douglas. 2014. Post-quantum key exchange for the TLS protocol from the ring learning with errors problem

[BCO+20]

Boschini Cecilia, Camenisch Jan, Ovsiankin Max, Spooner Nicholas. 2020. Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy.

[BCS13]

Bernstein Daniel J., Chou Tung, Schwabe Peter. 2013. McBits: Fast Constant-Time Code-Based Cryptography

[BD15]

Braga Alexandre, Dahab Ricardo. 2015. A Survey on Tools and Techniques for the Programming and Verification of Secure Cryptographic Software

[BD16]

Braga Alexandre, Dahab Ricardo. 2016. Towards a Methodology for the Development of Secure Cryptographic Software

[BDK+18]

Bos Joppe, Ducas Leo, Kiltz Eike, Lepoint T, Lyubashevsky Vadim, Schanck John M., Schwabe Peter, Seiler Gregor, Stehle Damien. 2018. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM

[BDK+21]

Bai Shi, Ducas Léo, Kiltz Eike, Lepoint Tancrède, Lyubashevsky Vadim, Schwabe Peter, Seiler Gregor, Stehlé Damien. 2021. CRYSTALS-Dilithium - Algorithm Specifications and Supporting Documentation

[BDP+20]

Beullens Ward, Disson Lucas, Pedersen Robi, Vercauteren Frederik. 2020. CSI-RAShi: Distributed key generation for CSIDH.

[BEP+21]

Bert Pauline, Eberhart Gautier, Prabel Lucas, Roux-Langlois Adeline, Sabt Mohamed. 2021. Implementation of Lattice Trapdoors on Modules and Applications

[BFG+19]

Brendel Jacqueline, Fischlin Marc, Günther Felix, Janson Christian, Stebila D.. 2019. Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms

[BFG+21]

Brendel Jacqueline, Fiedler Rune, Günther Felix, Janson Christian, Stebila Douglas. 2021. Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake

[BGR17]

Bhattacharya Sauvik, Garcia-Morchon Oscar, Rietman Ronald. 2017. spKEX: An optimized lattice-based key-exchange

[BHK+19]

Bernstein Daniel J., Hülsing Andreas, Kölbl Stefan, Niederhagen Ruben, Rijneveld Joost, Schwabe Peter. 2019. The SPHINCS+ Signature Framework

[BKN+20]

Bürstinghaus-Steinbach Kevin, Krauß Christoph, Niederhagen Ruben, Schneider Michael. 2020. Post-Quantum TLS on Embedded Systems

[BKS19]

Botros Leon, Kannwischer Matthias J., Schwabe Peter. 2019. Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4

[BL17]

Bernstein Daniel J., Lange Tanja. 2017. Post-quantum cryptography

[BL20]

Bernstein Daniel J., Lange Tanja. 2020. McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers

[BM17]

Both Leif, May Alexander. 2017. Optimizing BJMM with Nearest Neighbors : Full Decoding in 2 2 n / 21 and McEliece Security

[BM18]

Both Leif, May Alexander. 2018. Decoding Linear Codes with High Error Rate and Its Impact for LPN Security

[BM21]

Blanks Tamar Lichter, Miller Stephen D. 2021. Generating cryptographically-strong random lattice bases

[BMF+21]

Bellizia Davide, Mrabet Nadia El, Fournaris Apostolos P., Pontie Simon, Regazzoni Francesco, Standaert Francois-Xavier, Tasso Elise, Valea Emanuele. 2021. Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design

[BNG21]

Beckwith Luke, Nguyen Duc Tri, Gaj Kris. 2021. High-Performance Hardware Implementation of CRYSTALS-Dilithium

[BOG20]

Bischof Mario, Oder Tobias, Güneysu Tim. 2020. Efficient Microcontroller Implementation of BIKE

[BPS20]

Barker William, Polk William, Souppaya Murugiah. 2020. Getting Ready for Post-Quantum Cryptography:: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms

[BRP20]

Borges Fábio, Reis Paulo Ricardo, Pereira Diogo. 2020. A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography

[BRV20]

Bos Joppe, Renes Joost, Vredendaal Christine. 2020. Post-Quantum Cryptography with Contemporary Co-Processors

[BS08]

Biswas Bhaskar, Sendrier Nicolas. 2008. McEliece Cryptosystem Implementation: Theory and Practice

[BS20]

Bindel Nina, Schanck John M. 2020. Decryption Failure Is More Likely After Success.

[BS21]

Barker William, Souppaya Murugiah. 2021. [Project Description] Migration to Post-Quantum Cryptography (Draft)

[BSN+19]

Basu Kanad, Soni Deepraj, Nabeel Mohammed, Karri Ramesh. 2019. NIST Post-Quantum Cryptography - A Hardware Evaluation Study

[BSN21]

Barker William, Souppaya Murugiah, Newhouse William. 2021. [Project Description] Migration to Post-Quantum Cryptography

[BUC19]

Banerjee Utsav, Ukyab Tenzin S., Chandrakasan Anantha P.. 2019. Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

[BUG+21]

Berthet Quentin, Upegui Andres, Gantel Laurent, Duc Alexandre, Traverso Giulia. 2021. An Area-Efficient SPHINCS+ Post-Quantum Signature Coprocessor

[BZ21]

Bobrysheva Julia, Zapechnikov Sergey. 2021. Post-quantum Group Key Agreement Scheme

[Bd20]

Beullens Ward, de Saint Guilhem Cyprien Delpech. 2020. LegRoast: Efficient post-quantum signatures from the Legendre PRF.

[C17]

Chen Debiao He Kim-Kwang Raymond Choo Jianhua Dongqing Xu. 2017. Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error

[C19]

Campbell Robert. 2019. Evaluation of Post-Quantum Distributed Ledger Cryptography

[C20]

Corporation ISARA. 2020. Managing Cryptographic and Quantum Risk

[C21]

Costello Craig. 2021. The Case for SIKE: A Decade of the Supersingular Isogeny Problem

[CBH+18]

Chalkias Konstantinos, Brown James, Hearn Mike, Lillehagen Tommy, Nitto Igor, Schroeter Thomas. 2018. Blockchained Post-Quantum Signatures

[CC20]

Crockett Eric, Campagna Matt. 2020. Internet-Draft: Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS)

[CC21]

Chen Ming-Shing, Chou Tung. 2021. Classic McEliece on the ARM Cortex-M4

[CCA+21]

Chowdhury Sreeja, Covic Ana, Acharya Rabin Yu, Dupee Spencer, Ganji Fatemeh, Forte Domenic. 2021. Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions

[CCD+15]

Campagna Matthew, Chen Lidong, Dagdelen O., Ding Jintai, Fernick J, Gisin Nicolas, Hayford Donald, Jennewein Thomas, Lütkenhaus Norbert, Mosca Michele. 2015. Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges

[CCU+20]

Chou Tung, Cid Carlos, UiB Simula, Gilcher Jan, Lange Tanja, Maram Varun, Misoczki Rafael, Niederhagen Ruben, Paterson Kenneth G, Persichetti Edoardo, others . 2020. Classic McEliece: conservative code-based cryptography

[CCW+14]

Chang Yun-An, Chen Ming-Shing, Wu Jong-Shian, Yang Bo-Yin. 2014. Postquantum SSL/TLS for Embedded Systems

[CD20]

Castryck Wouter, Decru Thomas. 2020. CSIDH on the surface

[CDF+20]

Cremers Cas, Düzlü Samed, Fiedler Rune, Fischlin Marc, Janson Christian. 2020. BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures

[CDG+17]

Chase Melissa, Derler David, Goldfeder Steven, Orlandi Claudio, Ramacher Sebastian, Rechberger Christian, Slamanig Daniel, Zaverucha Greg. 2017. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

[CDG+20]

Cheng Hao, Dinu Daniel, Großschädl Johann, Rønne Peter B., Ryan Peter Y. A.. 2020. A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things

[CDH+19]

Chen Cong, Danba Oussama, Hostein Jerey, Hülsing Andreas, Rijneveld Joost, M. Schanck John, Schwabe Peter, Whyte William, Zhang Zhenfei. 2019. NTRU - Algorithm Specifications And Supporting Documentation

[CDJ+20]

Costello Craig, De Feo Luca, Jao David, Longa Patrick, Naehrig Michael, Renes Joost. 2020. Supersingular Isogeny Key Encapsulation

[CDS+20]

Cohen Alejandro, D’Oliveira Rafael G. L., Salamatian Salman, Medard Muriel. 2020. Network Coding-Based Post-Quantum Cryptography

[CGH+21]

Chen Jiahui, Gan Wensheng, Hu Muchuang, Chen Chien-Ming. 2021. On the Construction of a Post-Quantum Blockchain

[CGR+21]

Cheng Hao, GroBschadl Johann, Ronne Peter B., Ryan Peter Y.A.. 2021. AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers

[CHK+21]

Chung Chi-Ming Marvin, Hwang Vincent, Kannwischer Matthias J., Seiler Gregor, Shih Cheng-Jhih, Yang Bo-Yin. 2021. NTT Multiplication for NTT-unfriendly Rings:

[CJL+16]

Chen Lily, Jordan Stephen, Liu Yi-Kai, Moody Dustin, Peralta Rene, Perlner Ray, Smith-Tone Daniel. 2016. Report on Post-Quantum Cryptography

[CKM21]

Campos Fabio, Krämer Juliane, Müller Marcel. 2021. Safe-Error Attacks on SIKE and CSIDH

[CKY21]

Chou Tung, Kannwischer Matthias J., Yang Bo-Yin. 2021. Rainbow on Cortex-M4

[CLM+18]

Castryck Wouter, Lange Tanja, Martindale Chloe, Panny Lorenz, Renes Joost. 2018. CSIDH: An Efficient Post-Quantum Commutative Group Action

[CLO21]

Campagna Matt, LaMacchia Brian, Ott David. 2021. Post Quantum Cryptography: Readiness Challenges and the Approaching Storm

[CMC19]

Clancy T. Charles, McGwier Robert W., Chen Lidong. 2019. Post-Quantum Cryptography and 5G Security: Tutorial

[CPS19]

Crockett Eric, Paquin Christian, Stebila Douglas. 2019. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH

[CS19]

Costello Craig, Smith Benjamin. 2019. The supersingular isogeny problem in genus 2 and beyond

[CS20]

Cho Joo Yeon, Sergeev Andrew. 2020. Post-quantum MACsec key agreement for ethernet networks

[CU16]

Chen Liqun, Urian Rainer. 2016. Algorithm Agility – Discussion on TPM 2.0 ECC Functionalities

[D19]

D’Anvers Jan-Pieter. 2019. SABER: Mod-LWR based KEM (Round 3 Submission)

[D20]

D’Anvers Jan-Pieter. 2020. A Side-channel Resistant Implementation of SABER

[D21]

Dahmen-Lhuissier Sabine. 2021. ETSI - Quantum - Safe Cryptography, Computing Cryptography

[DAL+17]

Ding Jintai, Alsayigh Saed, Lancrenon Jean, Rv Saraswathy, Snook Michael. 2017. Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World

[DBK21]

Dabra Vivek, Bala Anju, Kumari Saru. 2021. Reconciliation based key exchange schemes using lattices: a review

[DDS+20]

Ding Jintai, Deaton Joshua, Schmidt Kurt, Vishakha , Zhang Zheng. 2020. Cryptanalysis of the Lifted Unbalanced Oil Vinegar Signature Scheme

[DFA+19]

Dang Viet B., Farahmand Farnoud, Andrzejczak Michal, Gaj Kris. 2019. Implementing and Benchmarking Three Lattice-Based Post-Quantum Cryptography Algorithms Using Software/Hardware Codesign

[DFA+20]

Dang Viet Ba, Farahmand Farnoud, Andrzejczak Michal, Mohajerani Kamyar, Nguyen Duc Tri, Gaj Kris. 2020. Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches

[DG21]

Dobson Samuel, Galbraith Steven D.. 2021. Post-Quantum Signal Key Agreement with SIDH

[DGG+18]

Deneuville Jean-Christophe, Gaborit Philippe, Guo Qian, Johansson Thomas. 2018. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol

[DGK+20]

Drucker Nir, Gueron Shay, Kostic Dusan, Ding J, Tillich JP. 2020. QC-MDPC Decoders with Several Shades of Gray.

[DHA+21]

Dr. Rachid El Bansarkhani, Hans-Peter Fischer, Andreas Schwab, Dr. Michael Riecker, Dr. Juliane Krämer. 2021. Definition of a quantum computer resistant encryption scheme

[DHM+20]

Das Bhargav, Holcomb Amelia, Mosca Michele, Pereira Geovandro. 2020. PQ-Fabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks

[DHP20]

Dowling Benjamin, Hansen Torben Brandt, Paterson Kenneth G. 2020. Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange

[DJC+19]

Ding Hang-chao, Jiang Han, Cai Jie, Wang Chen-guang, Zou Jing, Xu Qiu-Liang. 2019. Research on Key Exchange Protocol Based on LWE

[DK21]

Duc Tri Nguyen, Kris Gaj. 2021. Optimized Software Implementations of CRYSTALS-Kyber, NTRU, and Saber Using NEON-Based Special Instructions of ARMv8

[DKL+18]

Ducas Léo, Kiltz Eike, Lepoint Tancrède, Lyubashevsky Vadim, Schwabe Peter, Seiler Gregor, Stehlé Damien. 2018. CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme

[DKS+18]

D’Anvers Jan-Pieter, Karmakar Angshuman, Sinha Roy Sujoy, Vercauteren Frederik. 2018. Saber: Module-LWR Based Key Exchange, CPA-Secure Encryption and CCA-Secure KEM

[DLW19]

Dong Xiaoyang, Li Zheng, Wang Xiaoyun. 2019. Quantum cryptanalysis on some generalized Feistel schemes

[DMG21]

Dang Viet Ba, Mohajerani Kamyar, Gaj Kris. 2021. High-Speed Hardware Architectures and Fair FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber

[DMV+15]

Duta Cristina-Loredana, Mocanu Bogdan-Costel, Vladescu Florin-Alexandru, Gheorghe L., Tapus N.. 2015. Evaluation Framework for Security and Resource Consumption of Cryptographic Algorithms

[DP17]

Ding Jintai, Petzoldt Albrecht. 2017. Current State of Multivariate Cryptography

[DS05]

Ding Jintai, Schmidt Dieter. 2005. Rainbow, a New Multivariable Polynomial Signature Scheme

[DZD+20]

Ding Jintai, Zhang Zheng, Deaton Joshua, Wang Lih-Chung. 2020. A Complete Cryptanalysis of the Post-Quantum Multivariate Signature Scheme Himq-3

[E19]

Eurosmart . 2019. Quantum computers will compromise the security of identity documents

[E20]

Eriksson Hampus. 2020. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

[E21]

Evgnosia-Alexandra Kelesidis. 2021. A note on Post Quantum Onion Routing

[EGH+09]

Eisenbarth Thomas, Güneysu Tim, Heyse Stefan, Paar Christof. 2009. MicroEliece: McEliece for Embedded Devices

[EGM+20]

Escribano Pablos José Ignacio, González Vasco María Isabel, Marriaga Misael Enrique, Pérez del Pozo Ángel Luis. 2020. Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber

[ENS17]

El Hajji Said, Nitaj Abderrahmane, Souidi El Mamoun. 2017. Codes, Cryptology and Information Security: Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet

[EZS+19]

Esgin Muhammed F., Zhao Raymond K., Steinfeld Ron, Liu Joseph K., Liu Dongxi. 2019. MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol

[F18]

Fritzmann Tim. 2018. Error-Correcting Codes for Lattice-Based Key Exchange

[F20]

Fouque Pierre-Alain. 2020. Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU Specification v1.2

[FF20]

Fernández-Caramés Tiago, Fraga-Lamas Paula. 2020. Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

[FGR+21]

Fouque Pierre-Alain, Gérard François, Rossi Mélissa, Yu Yang. 2021. Zalcon: an alternative FPA-free NTRU sampler for Falcon

[FHR21]

Fauzi Prastudy, Hovd Martha Norberg, Raddum H\textbackslashaavard. 2021. A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem

[FKI+20]

Furue Hiroki, Kinjo Koha, Ikematsu Yasuhiko, Wang Yacheng, Takagi Tsuyoshi. 2020. A Structural Attack on Block-Anti-Circulant UOV at SAC 2019

[FKM+20]

Fluhrer Scott, Kampanakis Panos, McGrew David, Smyslov Valery. 2020. Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security

[FLP14]

Fischlin Marc, Lehmann Anja, Pietrzak Krzysztof. 2014. Robust Multi-Property Combiners for Hash Functions

[FMK16]

Fluhrer Scott, McGrew David, Kampanakis Panos. 2016. Postquantum Preshared Keys for IKEv2

[FP21]

Fouotsa Tako Boris, Petit Christophe. 2021. SimS: a Simplification of SiGamal

[FSM+19]

Fritzmann Tim, Sharif Uzair, Muller-Gritschneder Daniel, Reinbrecht Cezar, Schlichtmann Ulf, Sepulveda Johanna. 2019. Towards Reliable and Secure Post-Quantum Co-Processors based on RISC-V

[FSS20]

Fritzmann Tim, Sigl Georg, Sepúlveda Johanna. 2020. RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography

[FSX+12]

Fujioka Atsushi, Suzuki Koutarou, Xagawa Keita, Yoneyama Kazuki. 2012. Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices

[FSX+13]

Fujioka Atsushi, Suzuki Koutarou, Xagawa Keita, Yoneyama Kazuki. 2013. Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism

[FTT+18]

Fujioka Atsushi, Takashima Katsuyuki, Terada Shintaro, Yoneyama Kazuki. 2018. Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange

[FVS19]

Fritzmann Tim, Vith Jonas, Sepúlveda Johanna. 2019. Post-quantum key exchange mechanism for safety critical systems

[FVS20]

Fritzmann Tim, Vith Jonas, Sepulveda Johanna. 2020. Strengthening Post-Quantum Security for Automotive Systems

[G17]

Gheorghiu Vlad. 2017. Quantum-Proofing the Blockchain

[G18]

Gaj Kris. 2018. Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware

[G96]

Grover Lov K.. 1996. A fast quantum mechanical algorithm for database search

[GAB19]

Grote Olaf, Ahrens Andreas, Benavente-Peces Cesar. 2019. A Review of Post-quantum Cryptography and Crypto-agility Strategies

[GCC+18]

Gao Yu-Long, Chen Xiu-Bo, Chen Yu-Ling, Sun Ying, Niu Xin-Xin, Yang Yi-Xian. 2018. A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain

[GDL+17]

Gao Xinwei, Ding Jintai, Li Lin, RV Saraswathy, Liu Jiqiang. 2017. Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS

[GDS+19]

Gao Xinwei, Ding Jintai, Saraswathy R.v., Li Lin, Liu Jiqiang. 2019. Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol

[GFL19]

Gazdag Stefan-Lukas, Friedl Markus, Loebenberger Daniel. 2019. Post-Quantum Software Updates

[GGG+21]

Gazdag Stefan-Lukas, Grundner-Culemann Sophia, Guggemos Tobias, Heider Tobias, Loebenberger Daniel. 2021. A formal analysis of IKEv2’s post quantum extension

[GHK+21]

Gonzalez Ruben, Hülsing Andreas, Kannwischer Matthias J., Krämer Juliane, Lange Tanja, Stöttinger Marc, Waitz Elisabeth, Wiggers Thom, Yang Bo-Yin. 2021. Verifying Post-Quantum Signatures in 8 kB of RAM

[GHL+16]

Groot Bruinderink Leon, Hülsing Andreas, Lange Tanja, Yarom Yuval. 2016. Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme

[GK15]

Ghosh Satrajit, Kate Aniket. 2015. Post-Quantum Forward-Secure Onion Routing: (Future Anonymity in Today’s Budget)

[GKS20]

Gagliardoni Tommaso, Krämer Juliane, Struck Patrick. 2020. Quantum indistinguishability for public key encryption

[GKT13]

Gagliano Roque, Kent Stephen, Turner Sean. 2013. Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI)

[GLD+17]

Gao Xinwei, Li Lin, Ding Jintai, Liu Jiqiang, Saraswathy R. V., Liu Zhe. 2017. Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite

[GM20]

Gunsing AC, Mennink BJM. 2020. Collapseability of Tree Hashes

[GMP21]

Grubbs Paul, Maram Varun, Paterson Kenneth G.. 2021. Anonymous, Robust Post-Quantum Public Key Encryption

[GMR20]

Greuet A, Montoya S, Renault G. 2020. Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor

[GMS19]

Ghosh Santosh, Misoczki Rafael, Sastry Manoj. 2019. Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes

[GO17]

Guneysu Tim, Oder Tobias. 2017. Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things

[GPB+17]

Guillen Oscar M., Poppelmann Thomas, Bermudo Mera Jose M., Bongenaar Elena Fuentes, Sigl Georg, Sepulveda Johanna. 2017. Towards post-quantum security for IoT endpoints with NTRU

[GRS+22]

Gupta Daya Sagar, Ray Sangram, Singh Tajinder, Kumari Madhu. 2022. Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security

[GSE20]

Gellersen Tim, Seker Okan, Eisenbarth Thomas. 2020. Differential Power Analysis of the Picnic Signature Scheme.

[GWH+20]

Guo Tingting, Wang Peng, Hu Lei, Ye Dingfeng. 2020. Attack Beyond-Birthday-Bound MACs in Quantum Setting.

[GdK21]

Genêt Aymeric, de Guertechin Natacha Linard, Kalu Novak. 2021. Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4

[H15]

Housley R.. 2015. Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms

[H17]

Hecht Pedro. 2017. Post-Quantum Cryptography(PQC): Generalized ElGamal Cipher over GF(251\textasciicircum8)

[H18]

Hecht Pedro. 2018. PQC: Triple Decomposition Problem Applied To GL(d, Fp) - A Secure Framework For Canonical Non-Commutative Cryptography

[H19]

Heider Tobias. 2019. Towards a Verifiably SecureQuantum-Resistant Key Exchangein IKEv2

[H20]

Hecht Pedro. 2020. Algebraic Extension Ring Framework for Non-Commutative Asymmetric Cryptography

[H21]

Hecht Pedro. 2021. PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System

[HBG+18]

Huelsing Andreas, Butin Denis, Gazdag Stefan-Lukas, Rijneveld Joost, Mohaisen Aziz. 2018. XMSS: eXtended Merkle Signature Scheme

[HHP+21]

Hamburg Mike, Hermelink Julius, Primas Robert, Samardjiska Simona, Schamberger Thomas, Streit Silvan, Strieder Emanuele, van Vredendaal Christine. 2021. Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

[HKK+21]

Hashimoto Keitaro, Katsumata Shuichi, Kwiatkowski Kris, Prest Thomas. 2021. An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable

[HKL+21]

Heinz Daniel, Kannwischer Matthias J., Land Georg, Schwabe Peter, Sprenkels Daan. 2021. First-Order Masked Kyber on ARM Cortex-M4

[HKP21]

Hutchinson Aaron, Karabina Koray, Pereira Geovandro. 2021. Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE.

[HKW21]

Hagemeier Dr. Heike, Kousidis Dr. Stavros, Wunderer Dr. Thomas. 2021. Standardisierung von Post-Quanten-Kryptografie und Empfehlungen des BSI

[HLL+21]

Hemmert Dr. Tobias, Lochter Manfred, Loebenberger Daniel, Margraf Marian, Reinhardt Stephanie, Sigl Georg. 2021. Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen

[HLX21]

He Pengzhou, Lee Chiou-Yng, Xie Jiafeng. 2021. Compact Coprocessor for KEM Saber: Novel Scalable Matrix Originated Processing

[HNS+20]

Hülsing Andreas, Ning Kai-Chun, Schwabe Peter, Weber Florian, Zimmermann Philip R.. 2020. Post-quantum WireGuard

[HOK+18]

Howe James, Oder Tobias, Krausz Markus, Güneysu Tim. 2018. Standard Lattice-Based Key Encapsulation on Embedded Devices

[HPA21]

Howe James, Prest Thomas, Apon Daniel. 2021. SoK: How (not) to Design and Implement Post-quantum Cryptography

[HPP21]

Hermelink Julius, Pessl Peter, Pöppelmann Thomas. 2021. Fault-Enabled Chosen-Ciphertext Attacks on Kyber

[HPR+20]

Howe James, Prest Thomas, Ricosset Thomas, Rossi Mélissa. 2020. Isochronous Gaussian Sampling: From Inception to Implementation.

[HRS+17]

Hülsing Andreas, Rijneveld Joost, Schanck John, Schwabe Peter. 2017. High-Speed Key Encapsulation from NTRU

[HZH+20]

Huesmann Rolf, Zeier Alexander, Heinemann Andreas, Wiesmaier Alexander. 2020. Zur Benutzbarkeit und Verwendung von API-Dokumentationen

[HvG13]

Heyse Stefan, von Maurich Ingo, Güneysu Tim. 2013. Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices

[J20]

Jarecki Stanislaw. 2020. Topics in Cryptology – CT-RSA 2020: The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings

[J21]

Jonathan Bradbury Basil Hess. 2021. Fast Quantum-Safe Cryptography on IBM Z

[JAK+19]

Jalali Amir, Azarderakhsh Reza, Kermani Mehran Mozaffari, Jao David. 2019. Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM

[JGH+20]

Jiang Shaoquan, Gong Guang, He Jingnan, Nguyen Khoa, Wang Huaxiong. 2020. PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model

[JKE+21]

Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler. 2021. Faster Kyber and Saber via a Generic Fujisaki-Okamoto Transform for Multi-User Security in the QROM

[JS19]

Jaques Samuel, Schanck John M.. 2019. Quantum Cryptanalysis in the RAM Model: Claw-Finding Attacks on SIKE

[KAA21]

Karabulut Emre, Alkim Erdem, Aysu Aydin. 2021. Single-Trace Side-Channel Attacks on ω-Small Polynomial Sampling: With Applications to NTRU, NTRU Prime, and CRYSTALS-DILITHIUM

[KAK18]

Koziel Brian, Azarderakhsh Reza, Kermani Mehran Mozaffari. 2018. A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography

[KAM+17]

Koziel Brian, Azarderakhsh Reza, Mozaffari Kermani Mehran, Jao David. 2017. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves

[KGB+18]

Kannwischer Matthias J., Genêt Aymeric, Butin Denis, Krämer Juliane, Buchmann Johannes. 2018. Differential Power Analysis of XMSS and SPHINCS

[KGC+20]

Kumar V. B. Y., Gupta N., Chattopadhyay A., Kasper M., Krauß C., Niederhagen R.. 2020. Post-Quantum Secure Boot

[KGP+19]

Kuznetsov A. A., Gorbenko Yu І., Prokopovych-Tkachenko D. I., Lutsenko М. S., Pastukhov M. V.. 2019. NIST PQC: CODE-BASED CRYPTOSYSTEMS

[KHR+16]

Khalid A., Howe J., Rafferty C., O’Neill M.. 2016. Time-independent discrete Gaussian sampling for post-quantum cryptography

[KJA+16]

Koziel Brian, Jalali Amir, Azarderakhsh Reza, Jao David, Mozaffari-Kermani Mehran. 2016. NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM

[KK18]

Kiefer Franziskus, Kwiatkowski Kris. 2018. Hybrid ECDHE-SIDH Key Exchange for TLS

[KKP20]

Koteshwara S., Kumar M., Pattnaik P.. 2020. Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors

[KKS+20]

Kuznetsov A., Kiian A., Smirnov O., Cherep A., Kanabekova M., Chepurko I.. 2020. Testing of Code-Based Pseudorandom Number Generators for Post-Quantum Application

[KL19]

Krämer Juliane, Loiero Mirjam. 2019. Fault Attacks on UOV and Rainbow

[KL21]

Kirshanova Elena, Laarhoven Thijs. 2021. Lower bounds on lattice sieving and information set decoding

[KLC+17]

Kuo Po-Chun, Li Wen-Ding, Chen Yu-Wei, Hsu Yuan-Che, Peng Bo-Yuan, Cheng Chen-Mou, Yang Bo-Yin. 2017. High Performance Post-Quantum Key Exchange on FPGAs

[KLK+18]

Kuznetsov Alexandr, Lutsenko Maria, Kiian Nastya, Makushenko Tymur, Kuznetsova Tetiana. 2018. Code-based key encapsulation mechanisms for post-quantum standardization

[KMR20]

Kniep Quentin M., Müller Wolf, Redlich Jens-Peter. 2020. Post-Quantum Cryptography in WireGuard VPN

[KNW18]

Kreutzer Michael, Niederhagen Ruben, Waidner Michael. 2018. Eberbacher Gespräch: Next Generation Crypto

[KOV+18]

Khalid Ayesha, Oder Tobias, Valencia Felipe, O’ Neill Maire, Güneysu Tim, Regazzoni Francesco. 2018. Physical Protection of Lattice-Based Cryptography: Challenges and Solutions

[KPD+18]

Kampanakis Panos, Panburana Peter, Daw Ellie, Geest Daniel Van. 2018. The Viability of Post-quantum X.509 Certificates

[KPP20]

Kannwischer Matthias J., Pessl Peter, Primas Robert. 2020. Single-Trace Attacks on Keccak

[KRS+19]

Kannwischer Matthias J., Rijneveld Joost, Schwabe Peter, Stoffelen Ko. 2019. pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4

[KS19]

Kampanakis Panos, Sikeridis Dimitrios. 2019. Two PQ Signature Use-cases: Non-issues, challenges and potential solutions

[KS20]

Krämer Juliane, Struck Patrick. 2020. Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security.

[KSF+20]

Kampanakis Panos, Steblia Douglas, Friedl Markus, Hansen Torben, Sikeridis Dimitrios. 2020. Post-quantum public key algorithms for the Secure Shell (SSH) protocol

[KSL+19]

Kwiatkowski Krzysztof, Sullivan Nick, Langley Adam, Levin Dave, Mislove Alan. 2019. Measuring TLS key exchange with post-quantum KEM

[KV19]

Kwiatkowski Kris, Valenta Luke. 2019. The TLS Post-Quantum Experiment

[KZ20]

Kales Daniel, Zaverucha Greg. 2020. Improving the Performance of the Picnic Signature Scheme

[L16]

Langley Adam. 2016. ImperialViolet - CECPQ1 results

[L18]

Longa Patrick. 2018. A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies

[L19]

Langley Adam. 2019. Real-world measurements of structured-lattices and supersingular isogenies in TLS

[L20]

Lisovets Oleksiy. 2020. EM Side-channel Analysis on Smartphone Early Boot Encryption

[LCC+19]

Li Chao-Yang, Chen Xiu-Bo, Chen Yu-Ling, Hou Yan-Yan, Li Jian. 2019. A New Lattice-Based Signature Scheme in Post-Quantum Blockchain Network

[LCG18]

Liu Zhe, Choo Kim-Kwang Raymond, Grossschadl Johann. 2018. Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography

[LH20]

LeGrow Jason, Hutchinson Aaron. 2020. An Analysis of Fault Attacks on CSIDH

[LJd+21]

Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, de Queiroz Ruy J. G. B. , Amirton Bezerra Chagas, Jonysberg P. Quintino, Fabio Q. B. da Silva, Andre L. M. Santos, José Roberto Junior Ribeiro. 2021. Saber Post-Quantum Key Encapsulation Mechanism (KEM): Evaluating Performance in Mobile Devices and Suggesting Some Improvements

[LL13]

Lei Xinyu, Liao Xiaofeng. 2013. NTRU-KE: A Lattice-based Public Key Exchange Protocol

[LLJ20]

Lohachab Ankur, Lohachab Anu, Jangra Ajay. 2020. A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks

[LLK+06]

Li Xiangdong, Leung Lin, Kwan , Zhang Xiaowen, Kahanda , Anshel . 2006. Post-Quantum Diffie-Hellman and Symmetric Key Exchange Protocols

[LLP+13]

Lee Kyungroul, Lee Youngjun, Park Junyoung, Yim Kangbin, You Ilsun. 2013. Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)

[LSH20]

Lee Sangtae, Shin Youngjoo, Hur Junbeom. 2020. Return of version downgrade attack in the era of TLS 1.3

[LW19]

Li Zengpeng, Wang Ding. 2019. Achieving One-Round Password-based Authenticated Key Exchange over Lattices

[M02]

Maseberg Jan Sönke. 2002. Fail-Safe-Konzept für Public-Key-Infrastrukturen

[M15]

Mosca Michele. 2015. Cybersecurity in an era with quantum computers: will we be ready?

[M18]

Mundra Sunil. 2018. Enterprise Agility: Accelerating enterprise agility

[M20]

Ming Chen. 2020. A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy

[M21]

Mert Ahmet Can. 2021. A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange

[M78]

McEliece Robert J. 1978. A Public-Key Cryptosystem Based On Algebraic Coding Theory

[MAA+20]

Moody Dustin, Alagic Gorjan, Apon Daniel C, Cooper David A, Dang Quynh H, Kelsey John M, Liu Yi-Kai, Miller Carl A, Peralta Rene C, Perlner Ray A, Robinson Angela Y, Smith-Tone Daniel C, Alperin-Sheriff Jacob. 2020. Status report on the second round of the NIST post-quantum cryptography standardization process

[MAC+02]

Moore S., Anderson R., Cunningham P., Mullins R., Taylor G.. 2002. Improving smart card security using self-timed circuits

[MC20]

Mouha Nicky, Celi Christopher. 2020. Extending NIST’s CAVP Testing of Cryptographic Hash Function Implementations

[MCD+21]

Ma Chujiao, Colon Luis, Dera Joe, Rashidi Bahman, Garg Vaibhav. 2021. CARAF: Crypto Agility Risk Assessment Framework

[MCF19]

McGrew David, Curcio Michael, Fluhrer Scott. 2019. Leighton-Micali Hash-Based Signatures

[MCR18]

Mentens Nele, Charbon Edoardo, Regazzoni Francesco. 2018. Rethinking Secure FPGAs: Towards a Cryptography-Friendly Configurable Cell Architecture and Its Automated Design Flow

[MH19]

Macaulay Tyson, Henderson Richard. 2019. Cryptographic Agility in practice: emerging use-cases

[MH21]

Mashatan Atefeh, Heintzman Douglas. 2021. The Complex Path to Quantum Resistance: Is your organization prepared?

[MK19]

Marzougui Soundes, Krämer Juliane. 2019. Post-Quantum Cryptography in Embedded Systems

[MKF+16]

McGrew David, Kampanakis Panos, Fluhrer Scott, Gazdag Stefan-Lukas, Butin Denis, Buchmann Johannes. 2016. State Management for Hash-Based Signatures

[MO18]

Mehrez Hassane Aissaoui, Othmane EL. 2018. The Crypto-Agility Properties

[MOG15]

Maurich Ingo Von, Oder Tobias, Güneysu Tim. 2015. Implementing QC-MDPC McEliece Encryption

[MPD+18]

Malina Lukas, Popelova Lucie, Dzurenda Petr, Hajny Jan, Martinasek Zdenek. 2018. On Feasibility of Post-Quantum Cryptography on Small Devices

[MRD+20]

Malina Lukas, Ricci Sara, Dzurenda Petr, Smekal David, Hajny Jan, Gerlich Tomas. 2020. Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms

[MS18]

Moustafa Nagy, Soukharev Vladimir. 2018. Crypto Agility Is a Must-Have for Data Encryption Standards

[MST21]

Mattsson John Preuß, Smeets Ben, Thormarker Erik. 2021. Quantum-Resistant Cryptography

[MVB+21]

Michael Baentsch, Vlad Gheorghiu, Basil Hess, Christian Paquin, John Schanck, Douglas Stebila, Goutam Tamvada. 2021. Updates from the Open Quantum Safe Project

[MW18]

Mindermann Kai, Wagner Stefan. 2018. Usability and Security Effects of Code Examples on Crypto APIs

[MW20]

Mindermann K., Wagner S.. 2020. Fluid Intelligence Doesn’t Matter! Effects of Code Examples on the Usability of Crypto APIs

[MZ17]

Ma Fermi, Zhandry Mark. 2017. Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption

[Mdv+20]

Müller Moritz, de Jong Jins, van Heesch Maran, Overeinder Benno, van Rijswijk-Deij Roland. 2020. Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC

[N11]

Nelson David B.. 2011. Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS)

[N16]

NIST . 2016. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process

[N21]

Nguyen Phong Q.. 2021. Boosting the Hybrid Attack on NTRU: Torus LSH, Permuted HNF and Boxed Sphere

[NDR+17]

Nejatollahi Hamid, Dutt Nikil, Ray Sandip, Regazzoni Francesco, Banerjee Indranil, Cammarota Rosario. 2017. Software and Hardware Implementation of Lattice-based Cryptography Schemes

[NDR+19]

Nejatollahi Hamid, Dutt Nikil, Ray Sandip, Regazzoni Francesco, Banerjee Indranil, Cammarota Rosario. 2019. Post-Quantum Lattice-Based Cryptography Implementations: A Survey

[NM17]

National Academies of Sciences Engineering, Medicine . 2017. Cryptographic Agility and Interoperability: Proceedings of a Workshop

[NSH+21]

Nina Bindel, Sarah McCarthy, Hanif Rahbari, Geoff Twardokus. 2021. Suitability of 3rd Round Signature Candidates for Vehicle-to-Vehicle Communication –Extended Abstract

[NW17]

Niederhagen Ruben, Waidner Michael. 2017. Practical Post-Quantum Cryptography

[NWA+19]

Noel M. D., Waziri O. V., Abdulhamid M. S., Ojeniyi A. J.. 2019. Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency

[NWE19]

Neish Andrew, Walter Todd, Enge Per. 2019. Quantum-resistant authentication algorithms for satellite-based augmentation systems

[O20]

O. Saarinen Markku-Juhani. 2020. Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards

[OHW+18]

O’Neill Mark, Heidbrink Scott, Whitehead Jordan, Perdue Tanner, Dickinson Luke, Collett Torstein, Bonner Nick, Seamons Kent, Zappala Daniel. 2018. The Secure Socket API: TLS as an Operating System Service

[OP20]

Ounsworth Mike, Pala Massimiliano. 2020. Composite Keys and Signatures For Use In Internet PKI

[OPp19]

Ott David, Peikert Christopher, participants other workshop. 2019. Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility

[OSH+19]

Oder Tobias, Speith Julian, Höltgen Kira, Güneysu Tim. 2019. Towards Practical Microcontroller Implementation of the Signature Scheme Falcon

[OSP+16]

Oder Tobias, Schneider Tobias, Pöppelmann Thomas, Güneysu Tim. 2016. Practical CCA2-Secure and Masked Ring-LWE Implementation

[P20]

Perrin Trevor. 2020. KEM-based Hybrid Forward Secrecy for Noise

[PCC+99]

Paar Christof, Chetwynd Brendon Richard, Connor Thomas J., Deng Sheng Yung, Marchant Stephen J.. 1999. Algorithm-agile cryptographic coprocessor based on FPGAs

[PH16]

Park Aesun, Han Dong-Guk. 2016. Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption

[PM20]

Pradel Gaëtan, Mitchell Chris J.. 2020. Post-quantum Certificates for Electronic Travel Documents

[PMS+21]

Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy. 2021. On Generic Side-Channel Assisted Chosen Ciphertext Attacks on Lattice-based PKE/KEMs

[PMS19]

Petrenko Kyrylo, Mashatan Atefeh, Shirazi Farid. 2019. Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization

[PN19]

Paul Sebastian, Niethammer Melanie. 2019. On the importance of cryptographic agility for industrial automation: Preparing industrial systems for the quantum computing era

[PP21]

Pessl Peter, Prokop Lukas. 2021. Fault Attacks on CCA-secure Lattice KEMs

[PRK+19]

Pugh Sydney, Raunak M S, Kuhn D. Richard, Kacker Raghu. 2019. Systematic Testing of Post-Quantum Cryptographic Implementations Using Metamorphic Testing

[PS13]

Perlner Ray, Smith-Tone Daniel. 2013. A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems

[PS20]

Paul Sebastian, Scheible Patrik. 2020. Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication

[PSK+18]

Park Aesun, Shim Kyung-Ah, Koo Namhun, Han Dong-Guk. 2018. Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations

[PST19]

Paquin Christian, Stebila Douglas, Tamvada Goutam. 2019. Benchmarking Post-Quantum Cryptography in TLS

[Q21]

QuantiCor . 2021. Sicherheitsrisiko Quantencomputer

[R21]

Rognerud Robert. 2021. Post-Quantum Key Exchange in Telegram’s MTProto Protocol

[REB+21]

Ravi Prasanna, Ezerman Martianus Frederic, Bhasin Shivam, Chattopadhyay Anupam, Roy Sujoy Sinha. 2021. On Generic Side-Channel Assisted Chosen Ciphertext Attacks on Lattice-based PKE/KEMs Towards key recovery attacks on NTRU-based PKE/KEMs

[RFS20]

Roy Debapriya Basu, Fritzmann Tim, Sigl Georg. 2020. Efficient hardware/software co-design for post-quantum crypto algorithm SIKE on ARM and RISC-V based microcontrollers

[RGR21]

Raynal Mathilde, Genet Aymeric, Romailler Yolan. 2021. PQ-WireGuard: we did it again.

[RHC+21]

Ravi Prasanna, Howe James, Chattopadhyay Anupam, Bhasin Shivam. 2021. Lattice-Based Key Sharing Schemes: A Survey

[RKK21]

Roth Johannes, Karatsiolis Evangelos, Krämer Juliane. 2021. Classic McEliece Implementation with Low Memory Footprint

[RM20]

Raya Ali, Mariyappn K.. 2020. Diffie-Hellman Instantiations in Pre- and Post- Quantum World: A Review Paper

[RSC+20]

Ravi Prasanna, Sinha Roy Sujoy, Chattopadhyay Anupam, Bhasin Shivam. 2020. Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs

[RTK+21]

Richter Stefan, Thornton Matthew, Khan Imran, Scott Hamish, Jaksch Kevin, Vogl Ulrich, Stiller Birgit, Leuchs Gerd, Marquardt Christoph, Korolkova Natalia. 2021. Agile and versatile quantum communication: Signatures and secrets

[S09]

Sullivan Bryan. 2009. Cryptographic Agility

[S15]

Sushil Gerhard Chroust. 2015. Systemic Flexibility and Business Agility

[S17]

Saarinen Markku-Juhani Olavi. 2017. Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography

[S18]

Smith Benjamin. 2018. Pre- and Post-quantum Diffie–Hellman from Groups, Actions, and Isogenies \textbar SpringerLink

[S19]

Steel Graham. 2019. Blog - Achieving ‘Crypto Agility’

[S20]

Santoso Bagus. 2020. Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption

[S21]

Smyslov Valery. 2021. Alternative Approach for Mixing Preshared Keys in IKEv2 for Post-quantum Security

[S97]

Shor Peter W.. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

[SB19]

Simion Emil, Burciu Paul. 2019. THE POWER OF NIST CRYPTOGRAPHIC STATISTICAL TESTS SUITE

[SD18]

Streit Silvan, De Santis Fabrizio. 2018. Post-Quantum Key Exchange on ARMv8-A: A New Hope for NEON Made Simple

[SFG20]

Stebila D., Fluhrer S., Gueron S.. 2020. Internet-Draft: Hybrid key exchange in TLS 1.3

[SH19]

Soukharev Vladimir, Hess Basil. 2019. PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH

[SHK+20]

Suhail Sabah, Hussain Rasheed, Khan Abid, Hong Choong Seon. 2020. On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions

[SK20]

Shahid Furqan, Khan Abid. 2020. Post-quantum distributed ledger for internet of things

[SKD20]

Sikeridis Dimitrios, Kampanakis Panos, Devetsikiotis Michael. 2020. Assessing the Overhead of Post-Quantum Cryptography in TLS 1.3 and SSH

[SM16]

Stebila Douglas, Mosca Michele. 2016. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project

[SMK+18]

Spreitzer Raphael, Moonsamy Veelasha, Korak Thomas, Mangard Stefan. 2018. Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices

[SN21]

Suzuki Keita, Nuida Koji. 2021. An Improvement of a Key Exchange Protocol Relying on Polynomial Maps

[SNA+21]

Seyhan Kübra, Nguyen Tu N., Akleylek Sedat, Cengiz Korhan. 2021. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey

[SS17]

Schanck John M., Stebila Douglas. 2017. A Transport Layer Security (TLS) Extension For Establishing An Additional Shared Secret

[SSK+21]

Stadler Sara, Sakaguti Vitor, Kaur Harjot, Fehlhaber Anna Lena. 2021. Hybrid Signal protocol for post-quantum email encryption

[SSP+19]

Samardjiska Simona, Santini Paolo, Persichetti Edoardo, Banegas Gustavo. 2019. A Reaction Attack Against Cryptosystems Based on LRPC Codes

[SSW20]

Schwabe Peter, Stebila Douglas, Wiggers Thom. 2020. Post-quantum TLS without handshake signatures

[SV20]

Smith-Tone Daniel, Verbel Javier A. 2020. A Rank Attack Against Extension Field Cancellation.

[SWW14]

Sun Chang-ai, Wang Zuoyi, Wang Guan. 2014. A property-based testing framework for encryption programs

[SWZ16]

Schanck John M., Whyte William, Zhang Zhenfei. 2016. Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world

[SXZ+19]

Shen Ruping, Xiang Hong, Zhang Xin, Cai Bin, Xiang Tao. 2019. Application and Implementation of Multivariate Public Key Cryptosystem in Blockchain (Short Paper)

[So20]

Smith-Tone Daniel, others . 2020. Practical Cryptanalysis of k-ary C*.

[T20]

Thornton Matthew. 2020. Agile quantum cryptography and non-classical state generation: Agile quantum cryptography and non-classical state generation

[TAM+21]

Thomas Espitau, Akira Takahashi, Mehdi Tibouchi, Alexandre Wallet. 2021. Mitaka: A Simpler, Parallelizable, Maskable Variant of Falcon

[TDE+21]

Tasso Élise, De Feo Luca, El Mrabet Nadia, Pontié Simon. 2021. Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack

[THP+98]

Tarman T. D., Hutchinson R. L., Pierson L. G., Sholander P. E., Wirzke E. L.. 1998. Algorithm-agile encryption in ATM networks

[TLW19]

Tian Jing, Lin Jun, Wang Zhongfeng. 2019. Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography

[TMT+21]

Tendayi Kamucheka, Michael Fahr, Tristen Teague, Alexander Nelson, David Andrews, Miaoqing Huang. 2021. Power-based Side Channel Attack Analysis on PQC Algorithms

[TPD21]

Tao Chengdong, Petzoldt Albrecht, Ding Jintai. 2021. Efficient Key Recovery for all HFE Signature Variants

[TRH+20]

Tujner Zsolt, Rooijakkers Thomas, Heesch Maran, Önen Melek. 2020. QSOR: Quantum-safe Onion Routing

[TSS+18]

Torres Wilson Alberto, Steinfeld Ron, Sakzad Amin, Liu Joseph K., Kuchta Veronika, Bhattacharjee Nandita, Au Man Ho, Cheng Jacob. 2018. Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)

[TSZ19]

Tan Teik, Szalachowski Pawel, Zhou Jianying. 2019. SoK: Challenges of Post-Quantum Digital Signing in Real-world Applications

[TTg+19]

Tjhai C., Tomlinson M., grbartle@cisco.com , Fluhrer Scott, Geest Daniel Van, Garcia-Morchon Oscar, Smyslov Valery. 2019. Framework to Integrate Post-quantum Key Exchanges into Internet Key Exchange Protocol Version 2 (IKEv2)

[TWZ20]

Tao Yang, Wang Xi, Zhang Rui. 2020. Short Zero-Knowledge Proof of Knowledge for Lattice-Based Commitment.

[U17]

Ustimenko Vasyl. 2017. On Desynchronised Multivariate El Gamal Algorithm

[U18]

Utimaco . 2018. post-quantum crypto agility

[U20]

Unruh Dominique. 2020. Post-Quantum Verification of Fujisaki-Okamoto

[UWK15]

Ullmann Markus, Wieschebrink Christian, Kugler Dennis. 2015. Public Key Infrastructure and Crypto Agility Concept for Intelligent Transportation Systems

[UXT+22]

Ueno Rei, Xagawa Keita, Tanaka Yutaro, Ito Akira, Takahashi Junko, Homma Naofumi. 2022. Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

[V21]

Vassilev Apostol. 2021. Automation of the Cryptographic Module Validation Program (CMVP)

[VF21]

Vogt Sebastian, Funke Holger. 2021. How Quantum Computers threat security of PKIs and thus eIDs

[VM12]

Vasic Valter, Mikuc Miljenko. 2012. Security Agility Solution Independent of the Underlaying Protocol Architecture.

[VMV16]

Vasić Valter, Mikuc Miljenko, Vuković Marin. 2016. Lightweight and adaptable solution for security agility.

[W20]

Weller D L. 2020. Incorporating post-quantum cryptography in a microservice environment

[WAG21]

Wiesmaier Alexander, Alnahawi Nouri, Grasmeyer Tobias. 2021. On PQC Migration and Crypto-Agility

[WGR22]

Weger Violetta, Gassner Niklas, Rosenthal Joachim. 2022. A Survey on Code-Based Cryptography

[WNG+18]

Waidner Michael, Niederhagen Ruben, Grötker Thorsten, Reinelt Patrick. 2018. Post-Quantum Crypto for dummies

[WS20]

Wang Wen, Stöttinger Marc. 2020. Post-Quantum Secure Architectures for Automotive Hardware Secure Modules

[WZF+17]

Whyte W., Zhang Z., Fluhrer S., Garcia-Morchon O.. 2017. Internet-Draft: Quantum-Safe Hybrid (QSH) Key Exchange for Transport Layer Security (TLS) version 1.3

[X21]

Xagawa Keita. 2021. NTRU leads to Anonymous, Robust Public-Key Encryption

[XHY+20]

Xin Guozhu, Han Jun, Yin Tianyu, Zhou Yuchao, Yang Jianwei, Cheng Xu, Zeng Xiaoyang. 2020. VPQC: A Domain-Specific Vector Processor for Post-Quantum Cryptography Based on RISC-V Architecture

[XL20]

Xing Yufei, Li Shuguo. 2020. An Efficient Implementation of the NewHope Key Exchange on FPGAs

[XL21]

Xing Yufei, Li Shuguo. 2021. A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA

[YWL+18]

Yin Wei, Wen Qiaoyan, Li Wenmin, Zhang Hua, Jin Zhengping. 2018. An Anti-Quantum Transaction Authentication Approach in Blockchain

[YWT20]

Yasuda Takanori, Wang Yacheng, Takagi Tsuyoshi. 2020. Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers

[YXF+18]

Yuan Ye, Xiao Junting, Fukushima Kazuhide, Kiyomoto Shinsaku, Takagi Tsuyoshi. 2018. Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms

[Z15]

Zimmer Ephraim. 2015. Post-Quantum Kryptographie für IPsec

[Z20]

Zaverucha Greg. 2020. The Picnic Signature Algorithm Specification

[ZGF20]

Zoni Davide, Galimberti Andrea, Fornaciari William. 2020. Efficient and Scalable FPGA-Oriented Design of QC-LDPC Bit-Flipping Decoders for Post-Quantum Cryptography

[ZLC+20]

Zhang Cong, Liu Zilong, Chen Yuyang, Lu Jiahao, Liu Dongsheng. 2020. A Flexible and Generic Gaussian Sampler With Power Side-Channel Countermeasures for Quantum-Secure Internet of Things

[ZMR+21]

Zhang Lei, Miranskyy Andriy, Rjaibi Walid, Stager Greg, Gray Michael, Peck John. 2021. Making Existing Software Quantum Safe: Lessons Learned

[ZMR21]

Zhang Lei, Miranskyy Andriy, Rjaibi Walid. 2021. Quantum Advantage and the Y2K Bug: A Comparison

[ZSS20]

Zhao Raymond K, Steinfeld Ron, Sakzad Amin. 2020. COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers.

[ZTJ+19]

Zichen Li, Ting Xie, Juanmei Zhang, Ronghua Xu. 2019. Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem

[ZWH19]

Zeier Alexander, Wiesmaier Alexander, Heinemann Andreas. 2019. API Usability of Stateful Signature Schemes

[ZWH21]

Zeier Alexander, Wiesmaier Alexander, Heinemann Andreas. 2021. Zur Integration von Post-Quantum Verfahren in bestehende Softwareprodukte

[ZWW+21]

Zhang Peijun, Wang Lianhai, Wang Wei, Fu Kunlun, Wang Jinpeng. 2021. A Blockchain System Based on Quantum-Resistant Digital Signature

[ZYD+20]

Zhang Fan, Yang Bolin, Dong Xiaofei, Guilley Sylvain, Liu Zhe, He Wei, Zhang Fangguo, Ren Kui. 2020. Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE

[ZZD+14]

Zhang Jiang, Zhang Zhenfang, Ding Jintai, Snook Michael, Dagdelen Ozgur. 2014. Post-quantum Authenticated Key Exchange from Ideal Lattices

[ZZT+18]

Zhang Huang, Zhang Fangguo, Tian Haibo, Au Man Ho. 2018. Anonymous Post-Quantum Cryptocash

[d16]

de Vries Simon. 2016. Achieving 128-bit Security against Quantum Attacks in OpenVPN

[d21]

der Informationstechnik (BSI) Bundesamt für Sicherheit in. 2021. Kryptografie quantensicher gestalten

[dPT22]

de Guertechin Natacha Linard, Pontié Simon, Tasso Élise. 2022. Zero-Value Side-Channel Attacks on SIKE

[dRd+21]

da Silva Lima José Paulo, Ribeiro Leonardo A. D. S., de Queiroz Ruy J. G. B., Quintino Jonysberg P., da Silva Fabio Q. B., Santos Andre L. M., José Roberto. 2021. Evaluating Kyber post-quantum KEM in a mobile application

[vG14]

von Maurich Ingo, Güneysu Tim. 2014. Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices

[vWM11]

van Woudenberg Jasper G.J., Witteman Marc F., Menarini Federico. 2011. Practical Optical Fault Injection on Secure Microcontrollers

[vvA+19]

van Heesch Maran, van Adrichem Niels, Attema Thomas, Veugen Thijs. 2019. Towards Quantum-Safe VPNs and Internet

[ØSV21]

Øygarden Morten, Smith-Tone Daniel, Verbel Javier. 2021. On the Effect of Projection on Rank Attacks in Multivariate Cryptography

Last modified June 6, 2022