Commit a122148e authored by Nouri-Alnahawi's avatar Nouri-Alnahawi
Browse files

fix broken ref links

parent 798f17a2
Pipeline #73822 passed with stages
in 1 minute and 58 seconds
......@@ -16,17 +16,17 @@ The current state of PQC is represented by the ongoing [NIST PQC standardization
|-------------------------------------|-------------|------|------------|
| [BIKE]({{< ref "/bike" >}} "BIKE") | Bit flipping key encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) [[ABB+20]](../../refs#abb20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [CRYSTALS-Dilithium]({{< ref "/dilithium" >}} "CRYSTALS-Dilithium") | Digital signature scheme based on the hardness of lattice problems over module lattices [[DKL+21]](../../refs#dkl21) | Digital Signature | Round 3 Finalist |
| [Falcon]({{< ref "/falcon" >}} "Falcon") | Lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices [[FHK+20]](../../refs#fhk+20) | Digital Signature | Round 3 Finalist |
| [FrodoKEM]({{< ref "/frodo" >}} "FrodoKEM")| Key encapsulation from generic lattices [[NAB+20]](../../refs#nab+20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [Falcon]({{< ref "/falcon" >}} "Falcon") | Lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices [[FHK+20]](../../refs#fhk20) | Digital Signature | Round 3 Finalist |
| [FrodoKEM]({{< ref "/frodo" >}} "FrodoKEM")| Key encapsulation from generic lattices [[NAB+20]](../../refs#nab20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [GeMSS]({{< ref "/gemss" >}} "GeMSS") | Multivariate signature scheme producing small signatures [[CFP+19]](../../refs#cfp19) | Digital Signature | Round Three Alternative |
| [HQC]({{< ref "/hqc" >}} "HQC") | Hamming quasi-cyclic code-based public key encryption scheme [[MAB+20]](../../refs#mab20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [KYBER]({{< ref "/kyber" >}} "KYBER")| IND-CCA2-secure key-encapsulation mechanism (KEM) based on hard problems over module lattices [[ABD+21]](../../refs#abd21)| Public-key Encryption and Key-establishment | Round 3 Finalist |
| [Classic McEliece]({{< ref "/mceliece" >}} "Classic McEliece") | Code-based public-key cryptosystem based on random binary Goppa codes [[CCU+20]](../../refs#ccu+20) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [Classic McEliece]({{< ref "/mceliece" >}} "Classic McEliece") | Code-based public-key cryptosystem based on random binary Goppa codes [[CCU+20]](../../refs#ccu20) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [NTRU]({{< ref "/ntru" >}} "NTRU") | Public-key cryptosystem based on lattice-based cryptography [[CDH+19]](../../refs#cdh19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [NTRU-Prime]({{< ref "/prime" >}} "NTRU-Prime") | Small lattice-based key-encapsulation mechanism (KEM) [[BBC+20]](../../refs#bbc20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [Picnic]({{< ref "/picnic" >}} "Picnic") | Digital signature algorithems based on the zero-knowledge proof system and symmetric key primitives [[CDG+17]](../../refs#cdg17) | Digital Signature | Round 3 Alternative |
| [Rainbow]({{< ref "/rainbow" >}} "Rainbow")| Public key cryptosystem based on the hardness of solving a set of random multivariate quadratic systems [[DS05]](../../refs#ds05) | Digital Signature | Round 3 Finalist |
| [SABER]({{< ref "/saber" >}} "SABER") | IND-CCA2-secure Key Encapsulation Mechanism (KEM) based on the hardness of the Module Learning With Rounding problem (MLWR) [[DKR+19]](../../refs#dkr+19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [SABER]({{< ref "/saber" >}} "SABER") | IND-CCA2-secure Key Encapsulation Mechanism (KEM) based on the hardness of the Module Learning With Rounding problem (MLWR) [[DKR+19]](../../refs#dkr19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [SIKE]({{< ref "/sike" >}} "SIKE")| Isogeny-based key encapsulation suite based on pseudo-random walks in supersingular isogeny graphs [[CCH+20]](../../refs#cch20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [SPHINCS+]({{< ref "/sphincs" >}} "SPHINCS+") | A stateless hash-based signature scheme [[BHK+19]](../../refs#bhk19) | Digital Signature | Round 3 Alternative |
||
......
......@@ -21,7 +21,7 @@ Evaluation of the performance of PQC algorithms in various facets, classified in
- PQC in IoT:
- [From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things](https://ieeexplore.ieee.org/abstract/document/8932459) A wide view of post-quantum IoT security and give useful guidelines [[FC20]](../../refs#fc20)
- PQC in Distributed Ledger:
- [Evaluation of Post-Quantum Distributed Ledger Cryptography](https://jbba.scholasticahq.com/article/7679.pdf): Performance evaluation of qTesla in BC and DLTs [[Cam19]](../refs#cam19)
- [Evaluation of Post-Quantum Distributed Ledger Cryptography](https://jbba.scholasticahq.com/article/7679.pdf): Performance evaluation of qTesla in BC and DLTs [[Cam19]](../../refs#cam19)
##### **Hardware Performance**
- CRYSTALS-Dilithium and qTesla:
......
......@@ -19,7 +19,7 @@ weight: 6
- [Hybrid ECDHE-SIDH Key Exchange for TLS](https://datatracker.ietf.org/doc/html/draft-kiefer-tls-ecdhe-sidh-00): TLS key exchange combining Supersingular elliptic curve isogenie diffie-hellman (SIDH), with elliptic curve Diffie-Hellman (ECDHE) key exchange [[KiKw18]](../../refs#kikw18)
- [A Transport Layer Security (TLS) Extension for Establishing an Additional Shared Secret](https://datatracker.ietf.org/doc/html/draft-schanck-tls-additional-keyshare-00): TLS extension to establish an additional shared secret using a second key exchange algorithm [[ScSt17]](../../refs#scst17)
- SSH PQC Drafts:
- [Post-quantum public key algorithms for the Secure Shell (SSH) protocol](https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-pq-ssh-00) Hybrid key exchange in the SSH Transport Layer Protocol using ECDH and PQC signature schemes [[Kam+20]](../../refs#Kam20)
- [Post-quantum public key algorithms for the Secure Shell (SSH) protocol](https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-pq-ssh-00) Hybrid key exchange in the SSH Transport Layer Protocol using ECDH and PQC signature schemes [[Kam+20]](../../refs#kam20)
- IKEv2 PQC Drafts:
- [Mixing Preshared Keys in IKEv2 for Post-quantum Security](https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-qr-ikev2-11): Extension of IKEv2 to allow it to be resistant to a quantum computer by using pre-shared keys [[FMK19]](../../refs#fmk19)
- DNSSEC PQC Drafts:
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment