awesome-post-quantum
A curated list of resources about post-quantum cryptography.
To contribute, please file a PR. Please list items alphabetically.
Initiatives
- NIST's Post-Quantum Cryptography Project (Selected Algorithms 2022 announcement)
- Open Quantum Safe
- US Department of Homeland Security roadmap
Learning Resources
- IACR ePrint
- NSA Post-Quantum Cryptography FAQ
- pqcrypto.org (incl. conference series)
SoK-type papers:
- A Decade of Lattice-Based Cryptography by Chris Peikert
- Mathematics of Isogeny-Based Cryptography by Luca de Feo
Applications
- Microsoft/PQCrypto-VPN
- StarkWare (PQ proofs of knowledge)
Libraries
- aws/s2n-tls
- kudelskisecurity/crystals-go
- Microsoft/PQCrypto-LWEKE (FrodoKEM)
- Microsoft/PQCrypto-SIDH
- mupq/pqm4
- open-quantum-safe/liboqs
- PQClean/PQClean
- rustpq/pqcrypto
- wultra/sike-java
Algorithms
NIST Round 3
Code-based:
- BIKE (KEM, alternate candidate, round 4)
- Classic McEliece (KEM, finalist, round 4)
- HQC (KEM, alternate candidate, round 4)
Hash-based:
- SPHINCS+ (signature, alternate candidate, selected)
Isogeny-based:
- SIKE (KEM, alternate candidate, round 4)
Lattice-based:
- Dilithium (signature, finalist, selected)
- Falcon (signature, finalist, selected)
- FrodoKEM (KEM, alternate candidate)
- Kyber (KEM, finalist, selected)
- NTRU (KEM, finalist)
- NTRU Prime (KEM, alternate candidate)
- SABER (KEM, finalist)
MQ-based:
ZKP-based:
- Picnic (signature, alternate candidate)
Other Algorithms
Isogeny-based:
- CSIDH (KEM)
Companies
Respectable companies offering PQ solutions:
Standardization Efforts
IETF:
- ID Framework to Integrate Post-quantum Key Exchanges into Internet Key Exchange Protocol Version 2 (IKEv2)
- ID Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS)
- ID Hybrid key exchange in TLS 1.3
- RFC 8391: XMSS: eXtended Merkle Signature Scheme
- RFC 8554: Leighton-Micali Hash-Based Signatures