A curated list of resources about post-quantum cryptography.
To contribute, please file a PR. Please list items alphabetically.
- IACR ePrint
- NSA Post-Quantum Cryptography FAQ
- pqcrypto.org (incl. conference series)
SoK-type papers:
- A Decade of Lattice-Based Cryptography by Chris Peikert
- Mathematics of Isogeny-Based Cryptography by Luca de Feo
- Microsoft/PQCrypto-VPN
- StarkWare (PQ proofs of knowledge)
- aws/s2n-tls
- kudelskisecurity/crystals-go
- Microsoft/PQCrypto-LWEKE (FrodoKEM)
- Microsoft/PQCrypto-SIDH
- mupq/pqm4
- open-quantum-safe/liboqs
- PQClean/PQClean
- rustpq/pqcrypto
- wultra/sike-java
Code-based:
- BIKE (KEM, alternate candidate)
- Classic McEliece (KEM, finalist)
- HQC (KEM, alternate candidate)
Hash-based:
- SPHINCS+ (signature, alternate candidate)
Isogeny-based:
- SIKE (KEM, alternate candidate)
Lattice-based:
- Dilithium (signature, finalist)
- Falcon (signature, finalist)
- FrodoKEM (KEM, alternate candidate)
- Kyber (KEM, finalist)
- NTRU (KEM, finalist)
- NTRU Prime (KEM, alternate candidate)
- SABER (KEM, finalist)
MQ-based:
ZKP-based:
- Picnic (signature, alternate candidate)
Isogeny-based:
- CSIDH (KEM)
Respectable companies offering PQ solutions:
IETF:
- ID Framework to Integrate Post-quantum Key Exchanges into Internet Key Exchange Protocol Version 2 (IKEv2)
- ID Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS)
- ID Hybrid key exchange in TLS 1.3
- RFC 8391: XMSS: eXtended Merkle Signature Scheme
- RFC 8554: Leighton-Micali Hash-Based Signatures