Related Work
A collection of survey papers dealing with general challenges and recommendations regarding the migration to post-quantum cryptography and crypto-agility.
A full reference list can be found in the references section. All references are listed in alphabetical order.
- Biggest Failures in Security: A variety of problems in achieving IT security and possible strategies to solve them [AVV19]
- Cybersecurity in an era with quantum computers: will we be ready?: Assessment of the risks of quantum computers and their impact on the security of IT systems [M15]
- Eberbacher Gespräch: Next Generation Crypto: Key challenges forthree groups of industry differently involved in cryptography [KNW18]
- From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things: Challenges for PQC in IoT and comparison of the performance of PQC algorithms [F20]
- Getting Ready for Post-Quantum Cryptography:: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms: Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms [BPS20]
- Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility: A wide range of topics and challenges at a high abstraction level grouped into categories of PQC migration and crypto-agility [OPp19]
- Introduction to post-quantum cryptography: Introduction to post-quantum cryptography [B09]
- Kryptografie quantensicher gestalten: Overview of the recent development in quantum technology and recommendations for migration to quantum resistant cryptography [d21]
- Migration zu Post-Quanten-Kryptografie - Handlungsempfehlungen des BSI: Recommendations for action on migration to PQC by the BSI (German Federal Office for Information Security) [B20]
- On PQC Migration and Crypto-Agility: A literature survey and a snapshot of the discovered challenges and solutions categorized in different areas offering a single entry-point into the subject reflecting the current state [WAG21]
- On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions: Applications of one of the post-quantum signatures called Hash-Based Signature (HBS) schemes for the security of IoT devices in the quantum era [SHK20]
- On the State of Post-Quantum Cryptography Migration: Survey on the current state of the migration process towards PQ-Secure algorithms [AWG21]
- Post Quantum Cryptography: Readiness Challenges and the Approaching Storm: Literature-study article about the upcomming threat of quantum computers against the currently widely used cryptography. [CLO21]
- Post-Quantum Crypto for dummies: Introduction to post-quantum cryptography [WNG18]
- Post-Quantum Cryptography and 5G Security: Tutorial: On advancing the 3GPP 5G standards and NIST post-quantum cryptography standards in tandem, with the goal of launching a “quantum ready” 5G core network [CMC19]
- Post-quantum cryptography: Literature-study of the ongoing development of PQC-schemes and algorithms as well as the ongoing security-scruitiniering of them. [BL17]
- Practical Post-Quantum Cryptography: White paper from the Fraunhofer Institute for Secure Information Technology SIT addressing challenges of PQC migration and comparison of PQC algorithms [NW17]
- Quantencomputerresistente Kryptografie: Aktuelle Aktivitäten und Fragestellungen: A brief evaluation of the current state of both post-quantum and quantum cryptography [HLL21]
- Quantum Safe Cryptography and Security: An introduction, benefits, enablers and challenges: Important use cases for cryptography and potential migration strategies to transition to post-quantum cryptography [CCD15]
- Quantum computers will compromise the security of identity documents: The effects of quantum computers on the securiy of electronic identity documents [E19]
- Report on Post-Quantum Cryptography: NIST Internal Report of the current state of quantum computers and post-quantum cryptography. [CJL16]
- Sicherheitsrisiko Quantencomputer: Recommendations for post-quanum cryptography [A19]
- SoK: Challenges of Post-Quantum Digital Signing in Real-world Applications: Applications’ signing requirements against all 6 NIST’s post-quantum cryptography contest round 3 candidate algorithms [TSZ19]
- Standardisierung von Post-Quanten-Kryptografie und Empfehlungen des BSI: Overview of the current state of standardization of post Quantum cryptography with respect to the BSI recommendations. [HKW21]
Last modified June 6, 2022