Commit d5f20fca authored by Nouri-Alnahawi's avatar Nouri-Alnahawi
Browse files

update content

parent 19ddc493
Pipeline #73816 passed with stages
in 1 minute and 37 seconds
---
title: "SABER"
date: 2021-05-05T22:41:49+02:00
draft: false
type: docs
---
This is one algorithm page!
[SABER](https://www.esat.kuleuven.be/cosic/pqcrypto/saber/)
---
title: "SIKE"
date: 2021-05-05T22:41:49+02:00
draft: false
type: docs
---
This is one algorithm page!
[SIKE](https://sike.org/)
---
title: "SPHINCS+"
date: 2021-05-05T22:41:49+02:00
draft: false
type: docs
---
This is one algorithm page!
[SPHINCS+](https://sphincs.org/)
...@@ -5,7 +5,7 @@ draft: false ...@@ -5,7 +5,7 @@ draft: false
type: docs type: docs
weight: 5 weight: 5
--- ---
- RFC6916 PKIs Process Formalization: - RFC6916 PKIs process formalization:
- [Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI)](https://tools.ietf.org/html/rfc6916): RFC6916 formalizes the Migration Process for algorithm suites in the Resource Public Key Infrastructure [[GKT13]](../../refs#gkt13) - [Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI)](https://tools.ietf.org/html/rfc6916): RFC6916 formalizes the Migration Process for algorithm suites in the Resource Public Key Infrastructure [[GKT13]](../../refs#gkt13)
- Muckle Protocol Security Analysis: - Muckle protocol security analysis:
- [Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange](https://eprint.iacr.org/2020/099.pdf): Framework for the security analysis of hybrid authenticated key exchange protocols and Introduction of the Muckle protocol [[DHP20]](../../refs#dhp20) - [Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange](https://eprint.iacr.org/2020/099.pdf): Framework for the security analysis of hybrid authenticated key exchange protocols and Introduction of the Muckle protocol [[DHP20]](../../refs#dhp20)
...@@ -20,11 +20,13 @@ Evaluation of the performance of PQC algorithms in various facets, classified in ...@@ -20,11 +20,13 @@ Evaluation of the performance of PQC algorithms in various facets, classified in
- [Incorporating Post-Quantum Cryptographyin a Microservice Environment](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf) On the practical feasibility of using PQCin a microservice architecture [[WvdG20]](../../refs#wvdg20) - [Incorporating Post-Quantum Cryptographyin a Microservice Environment](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf) On the practical feasibility of using PQCin a microservice architecture [[WvdG20]](../../refs#wvdg20)
- PQC in IoT: - PQC in IoT:
- [From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things](https://ieeexplore.ieee.org/abstract/document/8932459) A wide view of post-quantum IoT security and give useful guidelines [[FC20]](../../refs#fc20) - [From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things](https://ieeexplore.ieee.org/abstract/document/8932459) A wide view of post-quantum IoT security and give useful guidelines [[FC20]](../../refs#fc20)
- PQC in Distributed Ledger:
- [Evaluation of Post-Quantum Distributed Ledger Cryptography](https://jbba.scholasticahq.com/article/7679.pdf): Performance evaluation of qTesla in BC and DLTs [[Cam19]](../refs#cam19)
##### **Hardware Performance** ##### **Hardware Performance**
- CRYSTALS-Dilithium and qTesla: - CRYSTALS-Dilithium and qTesla:
- [NIST Post-Quantum Cryptography - A Hardware Evaluation Study](https://eprint.iacr.org/2019/047) A hardware-based comparison of the NIST PQC candidates [[BSNK19]](../../refs#bsnk19) - [NIST Post-Quantum Cryptography - A Hardware Evaluation Study](https://eprint.iacr.org/2019/047) A hardware-based comparison of the NIST PQC candidates [[BSNK19]](../../refs#bsnk19)
- Performance critial use cases: - Performance critical use cases:
- [Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography](https://ieeexplore.ieee.org/document/9020384) Improved unconventional-radix finite-field multiplication (IFFM) algorithm reducing computational complexity by about 20% [[TLW19]](../../refs#tlw19) - [Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography](https://ieeexplore.ieee.org/document/9020384) Improved unconventional-radix finite-field multiplication (IFFM) algorithm reducing computational complexity by about 20% [[TLW19]](../../refs#tlw19)
- FPGA performance benefits: - FPGA performance benefits:
- [Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co-design approaches](https://cryptography.gmu.edu/athena/PQC/GMU_PQC_2020_SW_HW.pdf) Methodology for implementing and benchmarking PQC candidates usingboth hardware and software/hardware co-design approaches [[DFA+20]](../../refs#dfa20) - [Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co-design approaches](https://cryptography.gmu.edu/athena/PQC/GMU_PQC_2020_SW_HW.pdf) Methodology for implementing and benchmarking PQC candidates usingboth hardware and software/hardware co-design approaches [[DFA+20]](../../refs#dfa20)
...@@ -34,7 +36,7 @@ Evaluation of the performance of PQC algorithms in various facets, classified in ...@@ -34,7 +36,7 @@ Evaluation of the performance of PQC algorithms in various facets, classified in
- [Post-Quantum Secure Architectures for Automotive Hardware Secure Modules](https://eprint.iacr.org/2020/026.pdf) Building a post-quantum secure automotive HSM is feasible and can meet the hard requirements imposed by a modern vehicle ECU [[WaSt20]](../../refs#wast20) - [Post-Quantum Secure Architectures for Automotive Hardware Secure Modules](https://eprint.iacr.org/2020/026.pdf) Building a post-quantum secure automotive HSM is feasible and can meet the hard requirements imposed by a modern vehicle ECU [[WaSt20]](../../refs#wast20)
##### **Network Performacne** ##### **Network Performacne**
- Measurments and benchmarks: - Measurements and benchmarks:
- [Benchmarking Post-Quantum Cryptography in TLS](https://eprint.iacr.org/2019/1447) Packet loss rates above 3–5% start to have a significantimpact on post-quantum algorithms that fragment across many packets [[PST19]](../../refs#pst19) - [Benchmarking Post-Quantum Cryptography in TLS](https://eprint.iacr.org/2019/1447) Packet loss rates above 3–5% start to have a significantimpact on post-quantum algorithms that fragment across many packets [[PST19]](../../refs#pst19)
- [Real-world measurements of structured-lattices and supersingular isogenies in TLS](https://www.imperialviolet.org/2019/10/30/pqsivssl.html) Computational advantages of structured lattices make them a more attractive choice for post-quantum confidentiality [[Lang19]](../../refs#lang19) - [Real-world measurements of structured-lattices and supersingular isogenies in TLS](https://www.imperialviolet.org/2019/10/30/pqsivssl.html) Computational advantages of structured lattices make them a more attractive choice for post-quantum confidentiality [[Lang19]](../../refs#lang19)
- [Measuring TLS key exchange with post-quantum KEM](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/kwiatkowski-measuring-tls.pdf) [[KSL+19]](../../refs#ksl19) - [Measuring TLS key exchange with post-quantum KEM](https://csrc.nist.gov/CSRC/media/Events/Second-PQC-Standardization-Conference/documents/accepted-papers/kwiatkowski-measuring-tls.pdf) [[KSL+19]](../../refs#ksl19)
...@@ -42,7 +44,11 @@ Evaluation of the performance of PQC algorithms in various facets, classified in ...@@ -42,7 +44,11 @@ Evaluation of the performance of PQC algorithms in various facets, classified in
- TLS, DTLS, IKEv2 and QUIC PQC integrations: - TLS, DTLS, IKEv2 and QUIC PQC integrations:
- [The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/) Evaluating the performance and feasibility of deployment in TLS of two post-quantum key agreement ciphers [[KwVa19]](../../refs#kwva19) - [The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/) Evaluating the performance and feasibility of deployment in TLS of two post-quantum key agreement ciphers [[KwVa19]](../../refs#kwva19)
- [Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyberand SPHINCS+ with Mbed TLS](https://dl.acm.org/doi/abs/10.1145/3320269.3384725) Post-quantum key establishment with Kyber performs well in TLS on embedded devices compared to ECC variants [[BSKNS20]](../../refs#bskns20) - [Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyberand SPHINCS+ with Mbed TLS](https://dl.acm.org/doi/abs/10.1145/3320269.3384725) Post-quantum key establishment with Kyber performs well in TLS on embedded devices compared to ECC variants [[BSKNS20]](../../refs#bskns20)
- [Post-Quantum Kryptographie für IPsec](https://svs.informatik.uni-hamburg.de/publications/2015/2015-02-24-Zimmer-DFN-PQC-fuer-IPsec.pdf) Integration of the Niederreiter scheme in IPsec IKEv2 handshake [[Zim15]](../../refs#zim15)
- [Towards a Verifiably Secure Quantum-Resistant Key Exchange in IKEv2](https://www.nm.ifi.lmu.de/pub/Diplomarbeiten/heid19/PDF-Version/heid19.pdf) PQC integration in IKEv2 as a new PQ-IKEv2 protocol [[Hei19]](../../refs#hei19)
- [The Viability of Post-quantum X.509 Certificates](https://eprint.iacr.org/2018/063) Signature schemes standardized in NIST PQ Project can work with X.509certs in a post-quantum Internet [[KPDG18]](../../refs#kpdg18) - [The Viability of Post-quantum X.509 Certificates](https://eprint.iacr.org/2018/063) Signature schemes standardized in NIST PQ Project can work with X.509certs in a post-quantum Internet [[KPDG18]](../../refs#kpdg18)
- [Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project](https://link.springer.com/chapter/10.1007%2F978-3-319-69453-5_2) [[StMo16]](../../refs#stmo16) - [Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project](https://link.springer.com/chapter/10.1007%2F978-3-319-69453-5_2) [[StMo16]](../../refs#stmo16)
- VPN evaluations: - VPN evaluations:
- [Two PQ Signature Use-cases: Non-issues, challenges and potential solutions](https://eprint.iacr.org/2019/1276) Dilithium and Falcon are the best available options but come with an impact on TLS performance [[KaSi19]](../../refs#kasi19) - [Two PQ Signature Use-cases: Non-issues, challenges and potential solutions](https://eprint.iacr.org/2019/1276) Dilithium and Falcon are the best available options but come with an impact on TLS performance [[KaSi19]](../../refs#kasi19)
- [Towards Quantum-Safe VPNs and Internet](https://eprint.iacr.org/2019/1277.pdf): Evaluation of CPU overhead and security using OpenSSL and OpenVPN [[vHAA+19]](../../refs#vhaa19)
- [Post-quantum WireGuard](https://eprint.iacr.org/2020/379.pdf): PQ-WireGuard post-quantum variant of the handshake in the WireGuard VPN protocol [[HNS+20]](../../refs#hns20)
...@@ -17,5 +17,7 @@ weight: 4 ...@@ -17,5 +17,7 @@ weight: 4
- [The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/): Experiment between google and cloudflare comparing three groups using post-quantum CECPQ2, CECPQ2b or non-post-quantum X25519.[[KV19]](../../refs#kv19) - [The TLS Post-Quantum Experiment](https://blog.cloudflare.com/the-tls-post-quantum-experiment/): Experiment between google and cloudflare comparing three groups using post-quantum CECPQ2, CECPQ2b or non-post-quantum X25519.[[KV19]](../../refs#kv19)
- Hybrid Certificates: - Hybrid Certificates:
- [X.509-Compliant Hybrid Certificates for the Post-Quantum Transition](http://tubiblio.ulb.tu-darmstadt.de/115809/): Parallel usage of two independent cryptographic schemes within public key infrastructures enabling a stepwise transition to post-quantum secureand hybrid algorithms [[BBG+19]](../../refs#bbg19) - [X.509-Compliant Hybrid Certificates for the Post-Quantum Transition](http://tubiblio.ulb.tu-darmstadt.de/115809/): Parallel usage of two independent cryptographic schemes within public key infrastructures enabling a stepwise transition to post-quantum secureand hybrid algorithms [[BBG+19]](../../refs#bbg19)
- PQC protocol integration: - Decentralized PKIs:
- [QChain: Quantum-resistant and Decentralized PKI using Blockchain](https://caislab.kaist.ac.kr/publication/paper_files/2018/SCIS'18_HC_BC.pdf): Quantum-resistant decentralized PKI system using blockchain [[AnKi18]](../../refs#anki18)
<!-- - PQC protocol integration: -->
<!-- - [Post-Quantum Kryptographie - Classic McEliece](/docs/migration/McEliece.pdf) Introducing a new ASN.1 PQ key format and an evaluation of PQ integration for several cryptographic protocols [[Meun21]](../../refs#meun21) --> <!-- - [Post-Quantum Kryptographie - Classic McEliece](/docs/migration/McEliece.pdf) Introducing a new ASN.1 PQ key format and an evaluation of PQ integration for several cryptographic protocols [[Meun21]](../../refs#meun21) -->
...@@ -6,7 +6,7 @@ type: docs ...@@ -6,7 +6,7 @@ type: docs
weight: 3 weight: 3
--- ---
##### **Algorithm, Parameter Selection and Tradeoffs** ##### **Algorithm, Parameter Selection and Tradeoffs**
- Key/sig. size problematic for protocols: - Key/sig. size tradeoffs:
- [The Viability of Post-quantum X.509 Certificates](https://eprint.iacr.org/2018/063.pdf): Present suitable parameters for software signature use cases and good signature candidates for TLS 1.3 authentication. [[KPDG18]](../../refs#kpdg18) - [The Viability of Post-quantum X.509 Certificates](https://eprint.iacr.org/2018/063.pdf): Present suitable parameters for software signature use cases and good signature candidates for TLS 1.3 authentication. [[KPDG18]](../../refs#kpdg18)
- [Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communication](http://link.springer.com/10.1007/978-3-030-59013-0_15): Tradeoffs in security: big key/certificate sizes results in problems and difficulties for various protocols.[[PS20]](../../refs#ps20) - [Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial m2m communication](http://link.springer.com/10.1007/978-3-030-59013-0_15): Tradeoffs in security: big key/certificate sizes results in problems and difficulties for various protocols.[[PS20]](../../refs#ps20)
...@@ -24,9 +24,9 @@ weight: 3 ...@@ -24,9 +24,9 @@ weight: 3
##### **Side-Channel Attacks** ##### **Side-Channel Attacks**
- Side-Channel Attacks: - Side-Channel Attacks:
- [Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions](https://arxiv.org/abs/2005.04344): Overview of several PQC-related side-channel attacks[[CCA+21]](../../refs#cca21) - [Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions](https://arxiv.org/abs/2005.04344): Overview of several PQC-related side-channel attacks[[CCA+21]](../../refs#cca21)
- Minimize attack vectors: - Minimizing attack vectors:
- [Physical protection of lattice-based cryptography: Challenges and solutions](https://pure.qub.ac.uk/files/156772945/paper.pdf): Attack and countermeasure for gaussian sampler of lattice-based schemes. [[KOV+18]](../../refs#kov18) - [Physical protection of lattice-based cryptography: Challenges and solutions](https://pure.qub.ac.uk/files/156772945/paper.pdf): Attack and countermeasure for gaussian sampler of lattice-based schemes. [[KOV+18]](../../refs#kov18)
- [A side-channel resistant implementation of saber](https://eprint.iacr.org/2020/733.pdf): State of the art in terms of side channel attacks against lattice based cryptosystems and their respective countermeasures. [[VBDK+20]](../../refs#vbdk20) - [A side-channel resistant implementation of saber](https://eprint.iacr.org/2020/733.pdf): State of the art in terms of side channel attacks against lattice based cryptosystems and their respective countermeasures. [[VBDK+20]](../../refs#vbdk20)
- [Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE](https://ieeexplore.ieee.org/document/9181442): Side-Channel resistant implementation of saber, using masking as a countermeasure [[ZYD20]](../../refs#zyd20) - [Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE](https://ieeexplore.ieee.org/document/9181442): Side-Channel resistant implementation of saber, using masking as a countermeasure [[ZYD20]](../../refs#zyd20)
- Successfull attack on Himq-3: - Successful attack on Himq-3:
- [A complete cryptanalysis of the post-quantum multivariate signature scheme himq-3](https://link.springer.com/chapter/10.1007%2F978-3-030-61078-4_24): Singularity Attack: Successfully breaks signatures of the multivarite public key scheme Himq-3 [[DDW20]](../../refs#ddw20) - [A complete cryptanalysis of the post-quantum multivariate signature scheme himq-3](https://link.springer.com/chapter/10.1007%2F978-3-030-61078-4_24): Singularity Attack: Successfully breaks signatures of the multivarite public key scheme Himq-3 [[DDW20]](../../refs#ddw20)
...@@ -11,7 +11,20 @@ weight: 6 ...@@ -11,7 +11,20 @@ weight: 6
- [Standardisierung von post-quanten-kryptografie und empfehlungen des bsi](https://www.bsi.bund.de/DE/Service-Navi/Veranstaltungen/Deutscher-IT-Sicherheitskongress-30-Jahre-BSI/deutscher-it-sicherheitskongress-30-jahre-bsi_node.html): Overview of the current state of standardization of post Quantum cryptography with respect to the BSI recommendations. [[HKW21]](../../refs#hkw21) - [Standardisierung von post-quanten-kryptografie und empfehlungen des bsi](https://www.bsi.bund.de/DE/Service-Navi/Veranstaltungen/Deutscher-IT-Sicherheitskongress-30-Jahre-BSI/deutscher-it-sicherheitskongress-30-jahre-bsi_node.html): Overview of the current state of standardization of post Quantum cryptography with respect to the BSI recommendations. [[HKW21]](../../refs#hkw21)
- Open Quantum Project: - Open Quantum Project:
- [Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project](https://eprint.iacr.org/2016/1017.pdf): Open Quantum Project, libqos library: exemplary cryptographic applications like OpenSSL. Comparing NIST Round 2 PQC candidate implementations using OpenSSL [[SM16]](../../refs#sm16) - [Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project](https://eprint.iacr.org/2016/1017.pdf): Open Quantum Project, libqos library: exemplary cryptographic applications like OpenSSL. Comparing NIST Round 2 PQC candidate implementations using OpenSSL [[SM16]](../../refs#sm16)
- DNSSEC PQC Draft: - TLS PQC Drafts:
- [Hybrid key exchange in TLS 1.3](https://datatracker.ietf.org/doc/html/draft-ietf-tls-hybrid-design): Construction for hybrid key exchange in TLS protocol version 1.3 [[SFG20]](../../refs#sfg20)
- [Quantum-Safe Hybrid (QSH) Key Exchange for Transport Layer Security (TLS) version 1.3](https://datatracker.ietf.org/doc/html/draft-whyte-qsh-tls13-06): Mechanism for providing modular design for quantum-safe cryptography in the handshake for TLS protocol version 1.3 [[Wh+17]](../../refs#wh17)
- [Hybrid key exchange in TLS 1.2](https://datatracker.ietf.org/doc/html/draft-campagna-tls-bike-sike-hybrid-06): Hybrid key exchange schemes for TLS protocol version 1.2 [[CaCr21]](../../refs#cacr21)
- [Quantum-Safe Hybrid (QSH) Ciphersuite for Transport Layer Security (TLS) version 1.2](https://datatracker.ietf.org/doc/html/draft-whyte-qsh-tls12-02): New cipher suite providing modular design for quantum-safe cryptography in the handshake for TLS protocol version 1.2 [[SWZ16]](../../refs#swz16)
- [Hybrid ECDHE-SIDH Key Exchange for TLS](https://datatracker.ietf.org/doc/html/draft-kiefer-tls-ecdhe-sidh-00): TLS key exchange combining Supersingular elliptic curve isogenie diffie-hellman (SIDH), with elliptic curve Diffie-Hellman (ECDHE) key exchange [[KiKw18]](../../refs#kikw18)
- [A Transport Layer Security (TLS) Extension for Establishing an Additional Shared Secret](https://datatracker.ietf.org/doc/html/draft-schanck-tls-additional-keyshare-00): TLS extension to establish an additional shared secret using a second key exchange algorithm [[ScSt17]](../../refs#scst17)
- SSH PQC Drafts:
- [Post-quantum public key algorithms for the Secure Shell (SSH) protocol](https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-pq-ssh-00) Hybrid key exchange in the SSH Transport Layer Protocol using ECDH and PQC signature schemes [[Kam+20]](../../refs#Kam20)
- IKEv2 PQC Drafts:
- [Mixing Preshared Keys in IKEv2 for Post-quantum Security](https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-qr-ikev2-11): Extension of IKEv2 to allow it to be resistant to a quantum computer by using pre-shared keys [[FMK19]](../../refs#fmk19)
- DNSSEC PQC Drafts:
- [Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC](https://dl.acm.org/doi/10.1145/3431832.3431838): Evaluate three PQC-Algorithms that are suitable for DNSSEC within certain constraints [[MdJvH+20]](../../refs#mdjvh20) - [Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC](https://dl.acm.org/doi/10.1145/3431832.3431838): Evaluate three PQC-Algorithms that are suitable for DNSSEC within certain constraints [[MdJvH+20]](../../refs#mdjvh20)
- Decentralized Cert. Management: - Decentralized Cert. Management:
- [Next-generation web public-key infrastructure technologies](https://eprints.qut.edu.au/128643): New decentralized approach to certificate management based on generic blockchains (DPKIT), compatible with existing PKIs. [[HM19]](../../refs#hm19) - [Next-generation web public-key infrastructure technologies](https://eprints.qut.edu.au/128643): New decentralized approach to certificate management based on generic blockchains (DPKIT), compatible with existing PKIs. [[HM19]](../../refs#hm19)
- Draft for Composite Keys and Signatures:
- [Composite Keys and Signatures For Use In Internet PKI](https://tools.ietf.org/id/draft-ounsworth-pq-composite-sigs-01.html) This document defines the structures CompositePublicKey, CompositeSignatureValue, and CompositeParams, which are sequences of the respective structure for each component algorithm. [[OP20]](../../refs#op20)
...@@ -30,6 +30,9 @@ weight: 8 ...@@ -30,6 +30,9 @@ weight: 8
###### [ADPS16] ###### [ADPS16]
[E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe. Post-quantum key exchange—a new hope. In 25Th {USENIX } security symposium ( {USENIX } security 16), pages 327–343, 2016](https://eprint.iacr.org/2015/1092.pdf) [E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe. Post-quantum key exchange—a new hope. In 25Th {USENIX } security symposium ( {USENIX } security 16), pages 327–343, 2016](https://eprint.iacr.org/2015/1092.pdf)
###### [AnKi18]
[An, H., & Kim, K. (2018, January). QChain: Quantum-resistant and decentralized PKI using blockchain. In Proc. SCIS (pp. 1-8).](https://caislab.kaist.ac.kr/publication/paper_files/2018/SCIS'18_HC_BC.pdf)
###### [AVVY19] ###### [AVVY19]
[F. Armknecht, I. Verbauwhede, M. Volkamer, and M. Yung, editors. Biggest Failures in Security, volume 9 of Dagstuhl Reports. Dagstuhl Publishing, Nov. 2019.](https://drops.dagstuhl.de/opus/volltexte/2020/11981/) [F. Armknecht, I. Verbauwhede, M. Volkamer, and M. Yung, editors. Biggest Failures in Security, volume 9 of Dagstuhl Reports. Dagstuhl Publishing, Nov. 2019.](https://drops.dagstuhl.de/opus/volltexte/2020/11981/)
...@@ -66,6 +69,12 @@ weight: 8 ...@@ -66,6 +69,12 @@ weight: 8
###### [BSNK19] ###### [BSNK19]
[K. Basu, D. Soni, M. Nabeel, and R. Karri. 2019. NIST Post-Quantum Cryptography - A Hardware Evaluation Study](https://eprint.iacr.org/2019/047) [K. Basu, D. Soni, M. Nabeel, and R. Karri. 2019. NIST Post-Quantum Cryptography - A Hardware Evaluation Study](https://eprint.iacr.org/2019/047)
###### [CaCr21]
[Campagna, M., & Crockett, E. (2019). Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). Internet Engineering Task Force, Internet-Draft draft-campagna-tls-bike-sike-hybrid, 6](https://datatracker.ietf.org/doc/html/draft-campagna-tls-bike-sike-hybrid-06)
###### [Cam19]
[Campbell Sr, R. (2019). Evaluation of post-quantum distributed ledger cryptography. The Journal of The British Blockchain Association, 2(1), 7679.](https://jbba.scholasticahq.com/article/7679.pdf)
###### [CCA+21] ###### [CCA+21]
[S. Chowdhury, A. Covic, R. Y. Acharya, S. Dupee, and D. Ganji, F.and Forte. Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physi- cally unclonable functions. Journal of Cryptographic Engineering, February 2021.](https://arxiv.org/abs/2005.04344) [S. Chowdhury, A. Covic, R. Y. Acharya, S. Dupee, and D. Ganji, F.and Forte. Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physi- cally unclonable functions. Journal of Cryptographic Engineering, February 2021.](https://arxiv.org/abs/2005.04344)
...@@ -126,12 +135,18 @@ weight: 8 ...@@ -126,12 +135,18 @@ weight: 8
###### [FHK+20] ###### [FHK+20]
[P. A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, T.Ricosset, G. Seiler, W. Whyte, and Z. Zhang. 2020. Falcon: Fast-fourier lattice-based compact signatures over NTRU specifications v1. 2.NIST Post-Quantum Cryptography Standardization Round3 (2020)](https://falcon-sign.info/falcon.pdf) [P. A. Fouque, J. Hoffstein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, T.Ricosset, G. Seiler, W. Whyte, and Z. Zhang. 2020. Falcon: Fast-fourier lattice-based compact signatures over NTRU specifications v1. 2.NIST Post-Quantum Cryptography Standardization Round3 (2020)](https://falcon-sign.info/falcon.pdf)
###### [FMK19]
[Fluhrer, S., McGrew, D., Kampanakis, P., & Smyslov, V. (2019). Postquantum preshared keys for IKEv2. Internet Engineering Task Force, Internet-Draft draft-ietf-ipsecme-qr-ikev2-11.](https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-qr-ikev2-11)
###### [GKT13] ###### [GKT13]
[R. Gagliano, S. Kent, and S. Turner. Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI). Request for Comments. 2013. RFC 6916.](https://tools.ietf.org/html/rfc6916) [R. Gagliano, S. Kent, and S. Turner. Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI). Request for Comments. 2013. RFC 6916.](https://tools.ietf.org/html/rfc6916)
###### [GoKa15] ###### [GoKa15]
[Ghosh, S., & Kate, A. (2015, June). Post-quantum forward-secure onion routing. In International Conference on Applied Cryptography and Network Security (pp. 263-286). Springer, Cham](https://ieeexplore.ieee.org/abstract/document/9363165) [Ghosh, S., & Kate, A. (2015, June). Post-quantum forward-secure onion routing. In International Conference on Applied Cryptography and Network Security (pp. 263-286). Springer, Cham](https://ieeexplore.ieee.org/abstract/document/9363165)
###### [Hei19]
[Exchange, Quantum-Resistant Key. "Towards a Verifiably Secure Quantum-Resistant Key Exchange in IKEv2."](https://www.nm.ifi.lmu.de/pub/Diplomarbeiten/heid19/PDF-Version/heid19.pdf)
###### [HKW21] ###### [HKW21]
[H . Hagemeier, S. Kousidis, and T. Wunderer. Standardisierung von post-quanten-kryptografie und empfehlungen des bsi. In German Federal Office for Information Security (BSI), editor, Tagungsband zum 17. Deutschen IT-Sicherheitskongress, page 382–294. SecuMedia Verlag, Ingelheim, Germany, Feb 2021. Note: No direct link available!] [H . Hagemeier, S. Kousidis, and T. Wunderer. Standardisierung von post-quanten-kryptografie und empfehlungen des bsi. In German Federal Office for Information Security (BSI), editor, Tagungsband zum 17. Deutschen IT-Sicherheitskongress, page 382–294. SecuMedia Verlag, Ingelheim, Germany, Feb 2021. Note: No direct link available!]
...@@ -147,6 +162,9 @@ weight: 8 ...@@ -147,6 +162,9 @@ weight: 8
###### [HPDM20] ###### [HPDM20]
[A. Holcomb, G. C. C. F. Pereira, B. Das, and M. Mosca. PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks. arXiv:2010.06571](https://arxiv.org/abs/2010.06571) [A. Holcomb, G. C. C. F. Pereira, B. Das, and M. Mosca. PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks. arXiv:2010.06571](https://arxiv.org/abs/2010.06571)
###### [HNS+20]
[Hülsing, A., Ning, K. C., Schwabe, P., Weber, F., & Zimmermann, R. (2020). Post-quantum WireGuard. IACR Cryptol. ePrint Arch., 2020, 379.](https://eprint.iacr.org/2020/379.pdf)
###### [HZHW20] ###### [HZHW20]
[R. Huesmann, A. Zeier, A. Heinemann, and A. Wiesmaier. Zur Benutzbarkeit und Verwendung von API-Dokumentationen. In Christian Hansen, Andreas Nürnberger, and Bernhard Preim, editors, Mensch und Computer 2020 - Workshopband, Bonn, 2020. Gesellschaft für Informatik e.V. doi:10.18420/muc2020-ws119-002.](https://dl.gi.de/handle/20.500.12116/33515) [R. Huesmann, A. Zeier, A. Heinemann, and A. Wiesmaier. Zur Benutzbarkeit und Verwendung von API-Dokumentationen. In Christian Hansen, Andreas Nürnberger, and Bernhard Preim, editors, Mensch und Computer 2020 - Workshopband, Bonn, 2020. Gesellschaft für Informatik e.V. doi:10.18420/muc2020-ws119-002.](https://dl.gi.de/handle/20.500.12116/33515)
...@@ -156,12 +174,18 @@ weight: 8 ...@@ -156,12 +174,18 @@ weight: 8
###### [KAMJ17] ###### [KAMJ17]
[B. Koziel, R. Azarderakhsh, M. Mozaffari Kermani, and D. Jao. 2017. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves.IEEETransactions on Circuits and Systems I: Regular Papers64, 1 (Jan. 2017), 86–99](https://ieeexplore.ieee.org/abstract/document/7725935) [B. Koziel, R. Azarderakhsh, M. Mozaffari Kermani, and D. Jao. 2017. Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves.IEEETransactions on Circuits and Systems I: Regular Papers64, 1 (Jan. 2017), 86–99](https://ieeexplore.ieee.org/abstract/document/7725935)
###### [Kam+20]
[Panos Kampanakis and Douglas Steblia and Markus Friedl and Torben Hansen and Dimitrios Sikeridis. 2020. Post-quantum public key algorithms for the Secure Shell (SSH) protocol, 0 Internet-Draft. Internet Engineering Task Force](https://datatracker.ietf.org/doc/html/draft-kampanakis-curdle-pq-ssh-00)
###### [KaSi19] ###### [KaSi19]
[P. Kampanakis and D. Sikeridis. 2019.Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. Technical Report 1276](https://eprint.iacr.org/2019/1276) [P. Kampanakis and D. Sikeridis. 2019.Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. Technical Report 1276](https://eprint.iacr.org/2019/1276)
###### [KGC+20] ###### [KGC+20]
[V. B. Y. Kumar, N. Gupta, A. Chattopadhyay, M. Kasper, C. Krauß, and R. Nieder-hagen. 2020. Post-Quantum Secure Boot. In2020 Design, Automation Test inEurope Conference Exhibition (DATE). 1582–1585 doi:10.23919/DATE48585.2020.9116252](https://ieeexplore.ieee.org/document/9116252) [V. B. Y. Kumar, N. Gupta, A. Chattopadhyay, M. Kasper, C. Krauß, and R. Nieder-hagen. 2020. Post-Quantum Secure Boot. In2020 Design, Automation Test inEurope Conference Exhibition (DATE). 1582–1585 doi:10.23919/DATE48585.2020.9116252](https://ieeexplore.ieee.org/document/9116252)
###### [KiKw18]
[Kiefer, Franziskus, and Krzysztof Kwiatkowski. "Hybrid ECDHE-SIDH key exchange for TLS." draft-kiefer-tls-ecdhe-sidh-00 (work in progress) (2018).](https://datatracker.ietf.org/doc/html/draft-kiefer-tls-ecdhe-sidh-00)
###### [KKP20] ###### [KKP20]
[S. Koteshwara, M. Kumar, and P. Pattnaik. 2020. Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors.In2020 IEEE International Symposium on Performance Analysis of Systems andSoftware (ISPASS). 223–225](https://ieeexplore.ieee.org/abstract/document/9238630) [S. Koteshwara, M. Kumar, and P. Pattnaik. 2020. Performance Optimization of Lattice Post-Quantum Cryptographic Algorithms on Many-Core Processors.In2020 IEEE International Symposium on Performance Analysis of Systems andSoftware (ISPASS). 223–225](https://ieeexplore.ieee.org/abstract/document/9238630)
...@@ -255,6 +279,12 @@ weight: 8 ...@@ -255,6 +279,12 @@ weight: 8
###### [PST19] ###### [PST19]
[C. Paquin, D. Stebila, and G. Tamvada. 2019.Benchmarking Post-QuantumCryptography in TLS. Technical Report 1447] (http://eprint.iacr.org/2019/1447) [C. Paquin, D. Stebila, and G. Tamvada. 2019.Benchmarking Post-QuantumCryptography in TLS. Technical Report 1447] (http://eprint.iacr.org/2019/1447)
###### [ScSt17]
[Schanck, John M., and Douglas Stebila. "A Transport Layer Security (TLS) extension for establishing an additional shared secret." IETF Draft (2017).](https://datatracker.ietf.org/doc/html/draft-schanck-tls-additional-keyshare-00)
###### [SFG20]
[Steblia, D., Fluhrer, S. and Gueron, S., 2020. Hybrid key exchange in TLS 1.3. Internet-Draft draft-ietf-tls-hybrid-design-02. Internet Engineering Task Force.](https://datatracker.ietf.org/doc/html/draft-ietf-tls-hybrid-design)
###### [SKD20] ###### [SKD20]
[D. Sikeridis, P. Kampanakis, and M. Devetsikiotis. 2020. Post-Quantum Authentication in TLS 1.3: A Performance Study. Technical Report 071](http://eprint.iacr.org/2020/071) [D. Sikeridis, P. Kampanakis, and M. Devetsikiotis. 2020. Post-Quantum Authentication in TLS 1.3: A Performance Study. Technical Report 071](http://eprint.iacr.org/2020/071)
...@@ -267,6 +297,9 @@ weight: 8 ...@@ -267,6 +297,9 @@ weight: 8
###### [StMo16] ###### [StMo16]
[D. Stebila and M. Mosca. 2016. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In Selected Areas in Cryptography – SAC2016, R. Avanzi and H. Heys (Eds.). Springer International Publishing, 14–37](https://doi.org/10.1007/978-3-319-69453-5_2) [D. Stebila and M. Mosca. 2016. Post-quantum Key Exchange for the Internet and the Open Quantum Safe Project. In Selected Areas in Cryptography – SAC2016, R. Avanzi and H. Heys (Eds.). Springer International Publishing, 14–37](https://doi.org/10.1007/978-3-319-69453-5_2)
###### [SWZ16]
[Schanck, John M., William Whyte, and Zhenfei Zhang. "Quantum-safe hybrid (QSH) ciphersuite for Transport Layer Security (TLS) version 1.2." IETF, Internet-Draft draft-whyte-qsh-tls (2016)](https://datatracker.ietf.org/doc/html/draft-whyte-qsh-tls12-02)
###### [TLW19] ###### [TLW19]
[J. Tian, J. Lin, and Z. Wang. 2019. Ultra-Fast Modular Multiplication Implementa-tion for Isogeny-Based Post-Quantum Cryptography. In2019 IEEE InternationalWorkshop on Signal Processing Systems (SiPS). 97–102 doi:10.1109/SiPS47522.2019.9020384](https://ieeexplore.ieee.org/document/9020384) [J. Tian, J. Lin, and Z. Wang. 2019. Ultra-Fast Modular Multiplication Implementa-tion for Isogeny-Based Post-Quantum Cryptography. In2019 IEEE InternationalWorkshop on Signal Processing Systems (SiPS). 97–102 doi:10.1109/SiPS47522.2019.9020384](https://ieeexplore.ieee.org/document/9020384)
...@@ -276,6 +309,9 @@ weight: 8 ...@@ -276,6 +309,9 @@ weight: 8
###### [UWK15] ###### [UWK15]
[M. Ullmann, C. Wieschebrink, and D. Kügler. Public key infrastructure and crypto agility concept for intelligent transportation systems. In Sulc, Noll (Eds.): VEHICULAR 2015: The Fourth International Conference on Advances in Vehicular Systems, Technologies and Applications. October 11-16, 2015, St. Julians, Malta, pages 14 – 19, 2015.](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028.) [M. Ullmann, C. Wieschebrink, and D. Kügler. Public key infrastructure and crypto agility concept for intelligent transportation systems. In Sulc, Noll (Eds.): VEHICULAR 2015: The Fourth International Conference on Advances in Vehicular Systems, Technologies and Applications. October 11-16, 2015, St. Julians, Malta, pages 14 – 19, 2015.](http://www.thinkmind.org/index.php?view=article&articleid=vehicular_2015_1_30_30028.)
###### [vHAA+19]
[van Heesch, M., van Adrichem, N. L., Attema, T., & Veugen, T. (2019). Towards Quantum-Safe VPNs and Internet. IACR Cryptol. ePrint Arch., 2019, 1277.](https://eprint.iacr.org/2019/1277.pdf)
###### [VBDK+20] ###### [VBDK+20]
[M. Van Beirendonck, J. P. D’Anvers, A. Karmakar, J. Balasch, and I. Verbauwhede. A side-channel resistant implementation of saber. IACR Cryptol. ePrint Arch, 733, 2020.](https://eprint.iacr.org/2020/733.pdf) [M. Van Beirendonck, J. P. D’Anvers, A. Karmakar, J. Balasch, and I. Verbauwhede. A side-channel resistant implementation of saber. IACR Cryptol. ePrint Arch, 733, 2020.](https://eprint.iacr.org/2020/733.pdf)
...@@ -288,9 +324,15 @@ weight: 8 ...@@ -288,9 +324,15 @@ weight: 8
###### [WvdG20] ###### [WvdG20]
[D. Weller and R. van der Gaag. 2020. Incorporating post-quantum cryptographyin a microservice environment. (2020), 36](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf) [D. Weller and R. van der Gaag. 2020. Incorporating post-quantum cryptographyin a microservice environment. (2020), 36](https://homepages.staff.os3.nl/~delaat/rp/2019-2020/p13/report.pdf)
###### [Wh+17]
[Whyte, William, et al. "Quantum-safe hybrid (QSH) key exchange for Transport Layer Security (TLS) version 1.3." IETF Draft (2017)](https://datatracker.ietf.org/doc/html/draft-whyte-qsh-tls13-06)
###### [Zei20] ###### [Zei20]
[A. Zeier. 08.12.2020. eucrite 1.0 API.](https://use-a-pqclib.h-da.io/eucrite-documentation/) [A. Zeier. 08.12.2020. eucrite 1.0 API.](https://use-a-pqclib.h-da.io/eucrite-documentation/)
###### [Zim15]
[Zimmer, Dipl-Inf Ephraim. "Post-Quantum Kryptographie für IPsec." Sicherheit in vernetzten Systemen-22. DFN-Konferenz. Ed. by Christian Paulsen. DFN-CERT. 2015.](https://svs.informatik.uni-hamburg.de/publications/2015/2015-02-24-Zimmer-DFN-PQC-fuer-IPsec.pdf)
###### [ZWH19] ###### [ZWH19]
[A. Zeier, A. Wiesmaier, and A. Heinemann. API Usability of Stateful Signature Schemes. In The 14th International Workshop on Security (IWSEC), LNCS 11689, pages 1–20. Springer Switzerland, August 2019](https://link.springer.com/chapter/10.1007/978-3-030-26834-3_13) [A. Zeier, A. Wiesmaier, and A. Heinemann. API Usability of Stateful Signature Schemes. In The 14th International Workshop on Security (IWSEC), LNCS 11689, pages 1–20. Springer Switzerland, August 2019](https://link.springer.com/chapter/10.1007/978-3-030-26834-3_13)
......
{{ define "main" }}
<div class="td-content">
<h1>{{ .Title }}</h1>
{{ with .Params.description }}<div class="lead">{{ . | markdownify }}</div>{{ end }}
{{ if (and (not .Params.hide_readingtime) (.Site.Params.ui.readingtime.enable)) }}
{{ partial "reading-time.html" . }}
{{ end }}
{{ .Content }}
<!-- {{ partial "section-index.html" . }} -->
{{ if (and (not .Params.hide_feedback) (.Site.Params.ui.feedback.enable) (.Site.GoogleAnalytics)) }}
{{ partial "feedback.html" .Site.Params.ui.feedback }}
<br />
{{ end }}
{{ if (.Site.DisqusShortname) }}
<br />
{{ partial "disqus-comment.html" . }}
{{ end }}
<div class="text-muted mt-5 pt-3 border-top">{{ partial "page-meta-lastmod.html" . }}</div>
</div>
{{ end }}
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment