Towards security recommendations for public-key infrastructures for production environments in the post-quantum era
Tóm tắt
Tài liệu tham khảo
Adams C, Lloyd S. Understanding PKI: concepts, standards, and deployment considerations. 2nd ed. Reading: Addison-Wesley; 2002.
See Report by Digicert: Are you ready for the quantum leap?
Zalka C. Shor’s algorithm with fewer (pure) qubits. quant-ph/0601097 (2006).
Gouzien E, Sangouard N. Factoring 2048 RSA integers in 177 days with 13436 qubits and a multimode memory. arXiv:2103.06159.
Regev O. The learning with errors problem. In: Proceedings of the IEEE 25th annual conference on computational complexity. 2010. p. 191–204.
Naehrig M, Alkim E, Bos J, Ducas L, Easterbrook K, LaMacchia B, Longa P, Mironov I, Nikolaenko V, Peikert C, Raghunathan A, Stebila D. FrodoKEM. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
Schwabe P, Avanzi R, Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, Seiler G, Stehle D. CRYSTALS-KYBER. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
Alkim E, Avanzi R, Bos J, Ducas L, de la Piedra, Pöppelmann T, Schwabe P, Stebila D. NewHope. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
Lyubashevsky V, et al. CRYSTALS-Dilithium. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
Casanova A, Faugère J-C, Macario-Rat G, Patarin J, Perret L, Ryckeghem J. GeMSS: a Great Multivariate Short Signature. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
Beullens W, Preneel B, Szepieniec A, Vercauteren F. LUOV. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
Ding J, et al. Rainbow. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
Zhang S. Promised and distributed quantum search computing and combinatorics. Lect Notes Comput Sci. 2005;3595:430.
Tani S. An improved claw finding algorithm using quantum walk. Lect Notes Comput Sci. 2007;4708:536.
Becker A, Joux A, May A, Meurer A. Decoding random binary linear codes in \(2^{n}/20\): how \(1+1 = 0\) improves information set decoding. Lect Notes Comput Sci. 2012;7237:520.
Bernstein DJ. Grover vs. McEliece. Lect Notes Comput Sci. 2010;6061:73.
McGrew D, Curcio M, Fluhrer S. Leighton-Micali Hash-Based Signatures, RFC 8554 (2019).
Bernstein DJ, Hülsing A, Kölbl S, Niederhagen R, Rijneveld J, Schwabe P. SPHINCS+. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
Kudinov M, Kiktenko E, Fedorov A. Official Comments (Round 3) – SPHINCS+. https://csrc.nist.gov/CSRC/media/Projects/post-quantum-cryptography/documents/round-3/official-comments/Sphincs-Plus-round3-official-comment.pdf. Accessed 05 Aug 2020.
Chase M, et al. The picnic signature scheme. https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions. Accessed 05 Aug 2020.
NIST. Post-Quantum Cryptography Standardization Webpage. https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization.
Alagic G, et al. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. https://csrc.nist.gov/publications/detail/nistir/8309/final. Accessed 05 Aug 2020.
Coppersmith D. In: Proceedings of the EUROCRYPT 1996: advances in cryptology – EUROCRYPT ‘96. 1996. p. 178–89.