| [BIKE]({{<ref"/bike">}} "BIKE") | Bit flipping key encapsulation based on QC-MDPC (Quasi-Cyclic Moderate Density Parity-Check) [[ABB+20]](../../refs#abb20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [CRYSTALS-Dilithium]({{<ref"/dilithium">}} "CRYSTALS-Dilithium") | Digital signature scheme based on the hardness of lattice problems over module lattices [[DKL+21]](../../refs#dkl21) | Digital Signature | Round 3 Finalist |
| [Falcon]({{<ref"/falcon">}} "Falcon") | Lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices [[FHK+20]](../../refs#fhk+20) | Digital Signature | Round 3 Finalist |
| [FrodoKEM]({{<ref"/frodo">}} "FrodoKEM")| Key encapsulation from generic lattices [[NAB+20]](../../refs#nab+20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [Falcon]({{<ref"/falcon">}} "Falcon") | Lattice-based signature scheme based on the short integer solution problem (SIS) over NTRU lattices [[FHK+20]](../../refs#fhk20) | Digital Signature | Round 3 Finalist |
| [FrodoKEM]({{<ref"/frodo">}} "FrodoKEM")| Key encapsulation from generic lattices [[NAB+20]](../../refs#nab20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [GeMSS]({{<ref"/gemss">}} "GeMSS") | Multivariate signature scheme producing small signatures [[CFP+19]](../../refs#cfp19) | Digital Signature | Round Three Alternative |
| [HQC]({{<ref"/hqc">}} "HQC") | Hamming quasi-cyclic code-based public key encryption scheme [[MAB+20]](../../refs#mab20) | Public-key Encryption and Key-establishment | Round Three Alternative |
| [KYBER]({{<ref"/kyber">}} "KYBER")| IND-CCA2-secure key-encapsulation mechanism (KEM) based on hard problems over module lattices [[ABD+21]](../../refs#abd21)| Public-key Encryption and Key-establishment | Round 3 Finalist |
| [Classic McEliece]({{<ref"/mceliece">}} "Classic McEliece") | Code-based public-key cryptosystem based on random binary Goppa codes [[CCU+20]](../../refs#ccu+20) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [Classic McEliece]({{<ref"/mceliece">}} "Classic McEliece") | Code-based public-key cryptosystem based on random binary Goppa codes [[CCU+20]](../../refs#ccu20) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [NTRU]({{<ref"/ntru">}} "NTRU") | Public-key cryptosystem based on lattice-based cryptography [[CDH+19]](../../refs#cdh19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [NTRU-Prime]({{<ref"/prime">}} "NTRU-Prime") | Small lattice-based key-encapsulation mechanism (KEM) [[BBC+20]](../../refs#bbc20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [Picnic]({{<ref"/picnic">}} "Picnic") | Digital signature algorithems based on the zero-knowledge proof system and symmetric key primitives [[CDG+17]](../../refs#cdg17) | Digital Signature | Round 3 Alternative |
| [Rainbow]({{<ref"/rainbow">}} "Rainbow")| Public key cryptosystem based on the hardness of solving a set of random multivariate quadratic systems [[DS05]](../../refs#ds05) | Digital Signature | Round 3 Finalist |
| [SABER]({{<ref"/saber">}} "SABER") | IND-CCA2-secure Key Encapsulation Mechanism (KEM) based on the hardness of the Module Learning With Rounding problem (MLWR) [[DKR+19]](../../refs#dkr+19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [SABER]({{<ref"/saber">}} "SABER") | IND-CCA2-secure Key Encapsulation Mechanism (KEM) based on the hardness of the Module Learning With Rounding problem (MLWR) [[DKR+19]](../../refs#dkr19) | Public-key Encryption and Key-establishment | Round 3 Finalist |
| [SIKE]({{<ref"/sike">}} "SIKE")| Isogeny-based key encapsulation suite based on pseudo-random walks in supersingular isogeny graphs [[CCH+20]](../../refs#cch20) | Public-key Encryption and Key-establishment | Round 3 Alternative |
| [SPHINCS+]({{<ref"/sphincs">}} "SPHINCS+") | A stateless hash-based signature scheme [[BHK+19]](../../refs#bhk19) | Digital Signature | Round 3 Alternative |
@@ -21,7 +21,7 @@ Evaluation of the performance of PQC algorithms in various facets, classified in
- PQC in IoT:
-[From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things](https://ieeexplore.ieee.org/abstract/document/8932459) A wide view of post-quantum IoT security and give useful guidelines [[FC20]](../../refs#fc20)
- PQC in Distributed Ledger:
-[Evaluation of Post-Quantum Distributed Ledger Cryptography](https://jbba.scholasticahq.com/article/7679.pdf): Performance evaluation of qTesla in BC and DLTs [[Cam19]](../refs#cam19)
-[Evaluation of Post-Quantum Distributed Ledger Cryptography](https://jbba.scholasticahq.com/article/7679.pdf): Performance evaluation of qTesla in BC and DLTs [[Cam19]](../../refs#cam19)
-[A Transport Layer Security (TLS) Extension for Establishing an Additional Shared Secret](https://datatracker.ietf.org/doc/html/draft-schanck-tls-additional-keyshare-00): TLS extension to establish an additional shared secret using a second key exchange algorithm [[ScSt17]](../../refs#scst17)
- SSH PQC Drafts:
-[Post-quantum public key algorithms for the Secure Shell (SSH) protocol](https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-pq-ssh-00) Hybrid key exchange in the SSH Transport Layer Protocol using ECDH and PQC signature schemes [[Kam+20]](../../refs#Kam20)
-[Post-quantum public key algorithms for the Secure Shell (SSH) protocol](https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-pq-ssh-00) Hybrid key exchange in the SSH Transport Layer Protocol using ECDH and PQC signature schemes [[Kam+20]](../../refs#kam20)
- IKEv2 PQC Drafts:
-[Mixing Preshared Keys in IKEv2 for Post-quantum Security](https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-qr-ikev2-11): Extension of IKEv2 to allow it to be resistant to a quantum computer by using pre-shared keys [[FMK19]](../../refs#fmk19)