About 99,300 results
Open links in new tab
  1. Post-Quantum Cryptography Recommendations for TLS-based …

    Feb 26, 2025 · Consequently, there is an urgent need to update protocols and infrastructure with post-quantum cryptographic (PQC) algorithms. These algorithms are designed to remain secure against …

  2. In this paper, we explore how two major Internet security protocols, the Transport Layer Security (TLS) and Secure Shell (SSH) protocols, can be adapted to use post-quantum cryptography.

  3. Post-quantum cryptography - Wikipedia

    Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms (usually public-key algorithms) …

  4. Best Practices for Resisting Post-Quantum Attacks - TechDocs

    Jun 23, 2025 · There are many best practices you can implement now to defend against post-quantum attacks carried out by quantum computers, including defending against Harvest Now, Decrypt Later …

  5. Post-quantum cryptography (PQC) · Cloudflare SSL/TLS docs

    Oct 29, 2025 · Get an overview of how Cloudflare is deploying post-quantum cryptography to protect you against harvest now, decrypt later.

  6. Standards with Open Questions regarding PQC Adoption | Post-Quantum ...

    Sep 11, 2024 · This document analyzes standards that would require the integration of post-quantum (PQ) algorithms or the mitigation these algorithms bring in order to mitigate the quantum computing …

  7. ∗Shor’s quantum algorithm [42,53]. Assuming a practical quantum computer (QC) was available, it would solve ECDL and IF problems in polynomial time which would render ECDSA, ECDH and RSA …

  8. Post-Quantum Cryptography Recommendations for Internet …

    Nov 5, 2023 · Post-quantum cryptography brings some new challenges to applications, end users, and system administrators. This document describes characteristics unique to application protocols and …

  9. Post-Quantum Cybersecurity Resources

    Mar 4, 2025 · In response to requests from our National Security Systems (NSS) partners, the NSA Cybersecurity Directorate (CSD) has been asked to share its view on the remaining algorithms in the …

  10. Post-Quantum Cryptography | CSRC

    Jan 3, 2017 · Evaluation Criteria Evaluation Process Example Files RFC on Submission Requirements and Evaluation Criteria Round 1 Submissions Round 2 Submissions Round 3 Submissions Round 3 …