Useful Links
Computer Science
Cybersecurity
Quantum Cryptography and Post-Quantum Cryptography
1. Foundations of Modern Cryptography
2. Quantum Computing Fundamentals
3. Quantum Cryptography Principles
4. Quantum Key Distribution
5. QKD Implementation and Technology
6. QKD Security Analysis
7. Advanced Quantum Cryptographic Protocols
8. Post-Quantum Cryptography Foundations
9. Lattice-Based Cryptography
10. Code-Based Cryptography
11. Hash-Based Cryptography
12. Multivariate Cryptography
13. Isogeny-Based Cryptography
14. NIST Post-Quantum Cryptography Standardization
15. PQC Implementation and Deployment
16. Cryptanalysis of Post-Quantum Schemes
17. Quantum-Classical Cryptographic Integration
18. Quantum Networks and Infrastructure
19. Future Directions and Emerging Technologies
NIST Post-Quantum Cryptography Standardization
Standardization Process Overview
Call for Proposals
Submission Requirements
Evaluation Timeline
Evaluation Criteria
Security Requirements
Classical Attack Resistance
Quantum Attack Resistance
Security Level Categories
Performance Metrics
Key Sizes
Ciphertext and Signature Sizes
Computational Efficiency
Implementation Characteristics
Side-Channel Resistance
Implementation Simplicity
Hardware Suitability
Selection Rounds
Round 1 Analysis
Initial Submissions
Preliminary Evaluation
Round 2 Evaluation
Detailed Security Analysis
Performance Assessment
Round 3 Finalists
Final Candidate Selection
Intensive Review Process
Standardized Algorithms
Key Encapsulation Mechanisms
CRYSTALS-Kyber
Digital Signatures
CRYSTALS-Dilithium
FALCON
SPHINCS+
Alternative Candidates
Ongoing Evaluation
Future Standardization Rounds
Backup Algorithm Selection
Previous
13. Isogeny-Based Cryptography
Go to top
Next
15. PQC Implementation and Deployment