General
- A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography: Using an FPGA to implement a constant-time SIDH implementation with a security level of approximately 252 bits. [KAK18]
- A Survey on Post-Quantum Cryptography for Constrained Devices: Survey on Post-Quantum Cryptography schemes and their applicability to provide security in constrained devices. [S19]
- Biggest Failures in Security: A variety of problems in achieving IT security and possible strategies to solve them [AVV19]
- Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware: Overview and motivation for the PQC, NIST Standardization Effort, cryptographic competitions, and hardware benchmarking of candidates in cryptographic contests. [G18]
- Cybersecurity in an era with quantum computers: will we be ready?: Assessment of the risks of quantum computers and their impact on the security of IT systems [M15]
- Eberbacher Gespräch: Next Generation Crypto: Key challenges forthree groups of industry differently involved in cryptography [KNW18]
- Efficient Parallel Implementations of LWE-Based Post-Quantum Cryptosystems on Graphics Processing Units: Performance improvements using graphical proccesing units for LWE-based algorithms [AS20]
- From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things: Challenges for PQC in IoT and comparison of the performance of PQC algorithms [F20]
- Getting Ready for Post-Quantum Cryptography:: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms: Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms [BPS20]
- Hardware Deployment of Hybrid PQC: Small architecture for quantum-safe hybrid key exchange targeting ECDH and SIKE [AKK21]
- Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility: A wide range of topics and challenges at a high abstraction level grouped into categories of PQC migration and crypto-agility [OPp19]
- Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches: Methodology for implementing and benchmarking PQC candidates usingboth hardware and software/hardware co-design approaches [DFA20]
- Introduction to post-quantum cryptography: Introduction to post-quantum cryptography [B09]
- Kryptografie quantensicher gestalten: Overview of the recent development in quantum technology and recommendations for migration to quantum resistant cryptography [d21]
- Migration zu Post-Quanten-Kryptografie - Handlungsempfehlungen des BSI: Recommendations for action on migration to PQC by the BSI (German Federal Office for Information Security) [B20]
- NIST Post-Quantum Cryptography - A Hardware Evaluation Study: A hardware-based comparison of the NIST PQC candidates [BSN19]
- On Feasibility of Post-Quantum Cryptography on Small Devices: Experimental post-quantum cryptography implementations on small devices with different platforms [MPD18]
- On PQC Migration and Crypto-Agility: A literature survey and a snapshot of the discovered challenges and solutions categorized in different areas offering a single entry-point into the subject reflecting the current state [WAG21]
- On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions: Applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era [SHK20]
- On the State of Post-Quantum Cryptography Migration: Survey on the current state of the migration process towards PQ-Secure algorithms [AWG21]
- Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors: 52% and 83% improvement in performance for the CRYSTALS-Kyber KEM SHA3 variant and AES variant through Vectorization [KKP20]
- Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms: Implementation of several lattice-based encryption schemes and public-key exchange protocols including Lizard, ring-Lizard, Kyber, Frodo, and NewHope in JavaScript [YXF18]
- Post Quantum Cryptography: Readiness Challenges and the Approaching Storm: Literature-study article about the upcomming threat of quantum computers against the currently widely used cryptography. [CLO21]
- Post-Quantum Crypto for dummies: Introduction to post-quantum cryptography [WNG18]
- Post-Quantum Cryptography and 5G Security: Tutorial: On advancing the 3GPP 5G standards and NIST post-quantum cryptography standards in tandem, with the goal of launching a “quantum ready” 5G core network [CMC19]
- Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design: Lattice-based cryptography and its hardware security issues, namely side-channel and fault-based attacks. [BMF21]
- Post-Quantum Secure Boot: Post-quantum secure boot solution implemented fully as hardware for reasons of security and performance [KGC20]
- Post-quantum cryptography: Literature-study of the ongoing development of PQC-schemes and algorithms as well as the ongoing security-scruitiniering of them. [BL17]
- Practical Post-Quantum Cryptography: White paper from the Fraunhofer Institute for Secure Information Technology SIT addressing challenges of PQC migration and comparison of PQC algorithms [NW17]
- Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen: A brief evaluation of the current state of both post-quantum and quantum cryptography [HLL21]
- Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges: Important use cases for cryptography and potential migration strategies to transition to post-quantum cryptography [CCD15]
- Quantum computers will compromise the security of identity documents: The effects of quantum computers on the securiy of electronic identity documents [E19]
- Report on Post-Quantum Cryptography: NIST Internal Report of the current state of quantum computers and post-quantum cryptography. [CJL16]
- Sicherheitsrisiko Quantencomputer: Recommendations for post-quanum cryptography [A19]
- SoK: Challenges of Post-Quantum Digital Signing in Real-world Applications: Applications’ signing requirements against all 6 NIST’s post-quantum cryptography contest round 3 candidate algorithms [TSZ19]
- Standardisierung von Post-Quanten-Kryptografie und Empfehlungen des BSI: Overview of the current state of standardization of post Quantum cryptography with respect to the BSI recommendations. [HKW21]
- Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms: Evaluation of the NIST candidates regarding their suitability for the implementation on special hardware platforms [MRD20]
Last modified June 6, 2022