Published: May 17, 2021
Author(s)
James Howe (PQShield), Thomas Prest (PQShield), Daniel Apon (NIST)
Conference
Name: RSA Conference 2021
Dates: May 17-21, 2021
Location: [Virtual] San Francisco, California, United States
Citation: Topics in Cryptology – CT-RSA 2021, Lecture Notes in Computer Science vol. 12704,
Post-quantum cryptography has known a Cambrian Explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel resistant embedded implementations, large scale deployment tests and standardization efforts. This study systematizes the current state of knowledge on post-quantum cryptography. Compared to existing studies, we adopt a transversal point of view and center our study around three areas: (i) paradigms, (ii) implementation, (iii) deployment. Our point of view allows to cast almost all classical and post-quantum schemes into just a few paradigms. We highlight trends, common methodologies, pitfalls for look for and recurrent challenges.
Post-quantum cryptography has known a Cambrian Explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel resistant embedded implementations, large scale deployment tests and standardization...
See full abstract
Post-quantum cryptography has known a Cambrian Explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel resistant embedded implementations, large scale deployment tests and standardization efforts. This study systematizes the current state of knowledge on post-quantum cryptography. Compared to existing studies, we adopt a transversal point of view and center our study around three areas: (i) paradigms, (ii) implementation, (iii) deployment. Our point of view allows to cast almost all classical and post-quantum schemes into just a few paradigms. We highlight trends, common methodologies, pitfalls for look for and recurrent challenges.
Hide full abstract
Keywords
systematization of knowledge; post-quantum cryptography
Control Families
None selected