Post-quantum Secure Algorithms

Upgrade cryptographic algorithms to post-quantum secure algorithms (e.g. NewHope, Crystals-Kyber and NTRU), integrate post-quantum secure key exchange protocols (e.g. SIDH and ROFFE), implement post-quantum secure digital signatures (e.g. Rainbow and Falcon) and authentication protocols (e.g. Schnorr protocol), test and deploy properly, and monitor security on an ongoing basis.

Last updated