Abstract
Gaps facing the industry as quantum safe algorithms move closer to standardization.
- AgileSec Platform by INFOSEC Global; https://bit.ly/3kbotWeGoogle Scholar
- Campagna, M. and Crockett, E. Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). IETF Internet Draft. March 2020.Google Scholar
- Java Cryptography Extension (JCE); https://bit.ly/3lVtClCGoogle Scholar
- NIST Post Quantum Cryptography; https://bit.ly/3XGKcmxGoogle Scholar
- Stebila, S. et al. Hybrid Key Exchange in TLS 1.3. IETF Internet Draft. October 2020.Google Scholar
Index Terms
- Where Is the Research on Cryptographic Transition and Agility?
Recommendations
Stateless Cryptographic Protocols
FOCS '11: Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer ScienceSecure computation protocols inherently involve multiple rounds of interaction among the parties where, typically a party has to keep a state about what has happened in the protocol so far and then \emph{wait} for the other party to respond. We study if ...
Comments