This site was initiated by the research groups [Applied Cyber-Security](https://fbi.h-da.de/forschung/arbeitsgruppen/applied-cyber-security-darmstadt) and [User Centered Security](https://fbi.h-da.de/index.php?id=764) of [Darmstadt University of Applied Sciences](https://h-da.de/), funded by [ATHENE National Research Center for Applied Cybersecurity](https://www.athene-center.de).
| [BIKE]({{<ref"/bike">}} "BIKE") | Bit flipping keyencapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) [[ABB+20]](../../refs#abb20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [BIKE]({{<ref"/bike">}} "BIKE") | Bit flipping key-encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) [[ABB+20]](../../refs#abb20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [CRYSTALS-Dilithium]({{<ref"/dilithium">}} "CRYSTALS-Dilithium") | Digital signature scheme based on the hardness of lattice problems over module lattices [[DKL+21]](../../refs#dkl21) | Digital Signature | Round 3 Finalist |
| [Falcon]({{<ref"/falcon">}} "Falcon") | Lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices [[FHK+20]](../../refs#fhk20) | Digital Signature | Round 3 Finalist |
| [FrodoKEM]({{<ref"/frodo">}} "FrodoKEM")| Keyencapsulation from generic lattices [[NAB+20]](../../refs#nab20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [FrodoKEM]({{<ref"/frodo">}} "FrodoKEM")| Key-encapsulation from generic lattices [[NAB+21]](../../refs#nab21) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [GeMSS]({{<ref"/gemss">}} "GeMSS") | Multivariate signature scheme producing small signatures [[CFP+19]](../../refs#cfp19) | Digital Signature | Round Three Alternative |
| [HQC]({{<ref"/hqc">}} "HQC") | Hamming quasi-cyclic code-based publickey encryption scheme [[MAB+20]](../../refs#mab20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [HQC]({{<ref"/hqc">}} "HQC") | Hamming quasi-cyclic code-based public-key encryption scheme [[MAB+21]](../../refs#mab21) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [CRYSTALS-Kyber]({{<ref"/kyber">}} "KYBER")| IND-CCA2-secure key-encapsulation mechanism (KEM) based on hard problems over module lattices [[ABD+21]](../../refs#abd21)| Public-key Encryption and Key-establishment | Round 3 Finalist |
| [Classic McEliece]({{<ref"/mceliece">}} "Classic McEliece") | Code-based public-key cryptosystem based on random binary Goppa codes [[CCU+20]](../../refs#ccu20) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [NTRU]({{<ref"/ntru">}} "NTRU") | Public-key cryptosystem based on lattice-based cryptography [[CDH+19]](../../refs#cdh19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [NTRU-Prime]({{<ref"/prime">}} "NTRU-Prime") | Small lattice-based key-encapsulation mechanism (KEM) [[BBC+20]](../../refs#bbc20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [Picnic]({{<ref"/picnic">}} "Picnic") | Digital signature algorithems based on the zero-knowledge proof system and symmetric key primitives [[CDG+17]](../../refs#cdg17) | Digital Signature | Round 3 Alternative |
| [Rainbow]({{<ref"/rainbow">}} "Rainbow")| Publickey cryptosystem based on the hardness of solving a set of random multivariate quadratic systems [[DS05]](../../refs#ds05) | Digital Signature | Round 3 Finalist |
| [SABER]({{<ref"/saber">}} "SABER") | IND-CCA2-secure Key Encapsulation Mechanism (KEM) based on the hardness of the Module Learning With Rounding problem (MLWR) [[DKR+19]](../../refs#dkr19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [SIKE]({{<ref"/sike">}} "SIKE")| Isogeny-based keyencapsulation suite based on pseudo-random walks in supersingular isogeny graphs [[CCH+20]](../../refs#cch20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [Picnic]({{<ref"/picnic">}} "Picnic") | Digital signature algorithm based on the zero-knowledge proof system and symmetric key primitives [[CDG+17]](../../refs#cdg17) | Digital Signature | Round 3 Alternative |
| [Rainbow]({{<ref"/rainbow">}} "Rainbow")| Public-key cryptosystem based on the hardness of solving a set of random multivariate quadratic systems [[DS05]](../../refs#ds05) | Digital Signature | Round 3 Finalist |
| [SABER]({{<ref"/saber">}} "SABER") | IND-CCA2-secure key-encapsulation mechanism (KEM) based on the hardness of the module learning with rounding problem (MLWR) [[DKR+19]](../../refs#dkr19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [SIKE]({{<ref"/sike">}} "SIKE")| Isogeny-based key-encapsulation suite based on pseudo-random walks in supersingular isogeny graphs [[CCH+20]](../../refs#cch20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [SPHINCS+]({{<ref"/sphincs">}} "SPHINCS+") | A stateless hash-based signature scheme [[BHK+19]](../../refs#bhk19) | Digital Signature | Round 3 Alternative |
||
| [NewHope](https://newhopecrypto.org/) | Key-exchange protocol based on the Ring-Learning-with-Errors (Ring-LWE) problem [[ADPS16]](../../refs#adps16) | Public-key Encryption and Key-establishment | Round Two |
| [qTESLA](https://qtesla.org/) | Signature schemes based on the hardness of the decisional Ring Learning With Errors (R-LWE) problem [[ABB+20]](../../refs#abb20) | Digital Signature | Round Two |
| [qTESLA](https://qtesla.org/) | Signature scheme based on the hardness of the decisional ring learning with errors (R-LWE) problem [[ABB+20]](../../refs#abb20) | Digital Signature | Round Two |
[D. Moody, G. Alagic, D. C Apon, D. A. Cooper, Q. H. Dang, J. M. Kelsey, Y.Liu, C. A. Miller, R. C. Peralta, R. A. Perlner, A. Y. Robinson, D. C. Smith-Tone,and J. Alperin-Sheriff. 2020. Status report on the second round of the NISTpost-quantum cryptography standardization process.](https://doi.org/10.6028/NIST.IR.8309)
###### [MAB+20]
[C. Aguilar Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, E. Persichetti, G. Zémor, and I. C. Bourges. Hamming quasi-cyclic (hqc). NIST PQC Round, 3, 2020](https://pqc-hqc.org/doc/hqc-specification_2020-10-01.pdf)
###### [MAB+21]
[C. Aguilar Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J. C. Deneuville, P. Gaborit, E. Persichetti, G. Zémor, and I. C. Bourges. Hamming quasi-cyclic (hqc). NIST PQC Round, 3, 2021](http://pqc-hqc.org/doc/hqc-specification_2021-06-06.pdf)
###### [Mas02]
[S. Maseberg. Fail-Safe-Konzept für Public-Key-Infrastrukturen. PhDthesis, 2002.](http://tuprints.ulb.tu-darmstadt.de/246/)
...
...
@@ -249,8 +249,8 @@ weight: 8
###### [MW20]
[K. Mindermann and S. Wagner. 2020. Fluid Intelligence Doesn’t Matter! Effectsof Code Examples on the Usability of Crypto APIs. In2020 IEEE/ACM 42ndInternational Conference on Software Engineering: Companion Proceedings (ICSE-Companion). 306–307.](https://arxiv.org/abs/2004.03973)
###### [NAB+20]
[M. Naehrig, E. Alkim, J. W Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa,I. Mironov, V. Nikolaenko, C. Peikert, et al.2020. Frodokem learning with errorskey encapsulation.NIST PQC Round3 (2020)](https://frodokem.org/files/FrodoKEM-specification-20171130.pdf)
###### [NAB+21]
[M. Naehrig, E. Alkim, J. W Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa,I. Mironov, V. Nikolaenko, C. Peikert, et al.2020. Frodokem learning with errorskey encapsulation.NIST PQC Round3 (2021)](https://frodokem.org/files/FrodoKEM-specification-20210604.pdf)
###### [NIWA17]
[Niederhagen, R., & Waidner, M. (2017). Practical Post-Quantum Cryptography. Fraunhofer White Paper, vol. ISSN, 2192-8169](https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Practical.PostQuantum.Cryptography_WP_FraunhoferSIT.pdf?_=1503992279)