UsefulLinks
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
14.
NIST Post-Quantum Cryptography Standardization
14.1.
Standardization Process Overview
14.1.1.
Call for Proposals
14.1.2.
Submission Requirements
14.1.3.
Evaluation Timeline
14.2.
Evaluation Criteria
14.2.1.
Security Requirements
14.2.1.1.
Classical Attack Resistance
14.2.1.2.
Quantum Attack Resistance
14.2.1.3.
Security Level Categories
14.2.2.
Performance Metrics
14.2.2.1.
Key Sizes
14.2.2.2.
Ciphertext and Signature Sizes
14.2.2.3.
Computational Efficiency
14.2.3.
Implementation Characteristics
14.2.3.1.
Side-Channel Resistance
14.2.3.2.
Implementation Simplicity
14.2.3.3.
Hardware Suitability
14.3.
Selection Rounds
14.3.1.
Round 1 Analysis
14.3.1.1.
Initial Submissions
14.3.1.2.
Preliminary Evaluation
14.3.2.
Round 2 Evaluation
14.3.2.1.
Detailed Security Analysis
14.3.2.2.
Performance Assessment
14.3.3.
Round 3 Finalists
14.3.3.1.
Final Candidate Selection
14.3.3.2.
Intensive Review Process
14.4.
Standardized Algorithms
14.4.1.
Key Encapsulation Mechanisms
14.4.1.1.
CRYSTALS-Kyber
14.4.2.
Digital Signatures
14.4.2.1.
CRYSTALS-Dilithium
14.4.2.2.
FALCON
14.4.2.3.
SPHINCS+
14.5.
Alternative Candidates
14.5.1.
Ongoing Evaluation
14.5.2.
Future Standardization Rounds
14.5.3.
Backup Algorithm Selection
Previous
13. Isogeny-Based Cryptography
Go to top
Next
15. PQC Implementation and Deployment