Post-quantum cryptography

Motivation:
Introduction
Quantum computing
Cryptography:
Hash-based
Code-based
Lattice-based
MQ

Introduction

Here's the one-minute introduction: "Imagine that it's fifteen years from now. Somebody announces that he's built a large quantum computer. RSA is dead. DSA is dead. Elliptic curves, hyperelliptic curves, class groups, whatever, dead, dead, dead. So users are going to run around screaming and say 'Oh my God, what do we do?' Well, we still have secret-key cryptography, and we still have some public-key systems. There's hash trees. There's NTRU. There's McEliece. There's multivariate-quadratic systems. But we need more experience with these. We need algorithms. We need paddings, like OAEP. We need protocols. We need software, working software for these systems. We need speedups. We need to know what kind of key sizes to use. So come to PQCrypto and figure these things out before somebody builds a quantum computer."

For a twenty-minute introduction, read the following paper: Daniel J. Bernstein. "Introduction to post-quantum cryptography." http://www.springer.com/math/numbers/book/978-3-540-88701-0?detailsPage=samplePages [PDF mirror] This paper is the introductory chapter of the following book: Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen (editors). Post-quantum cryptography. Springer, Berlin, 2009. ISBN 978-3-540-88701-0.

For much more information, read the rest of the book! There are five detailed chapters surveying the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate-quadratic-equations cryptography. The book has a 2009 publication date but was already available in November 2008 from booksellers such as Amazon.

For earlier analyses of the impact of quantum computers on cryptography, see the following papers:

See also this site's separate lists of papers on hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate-quadratic-equations cryptography.

Conferences

New conference series devoted to post-quantum cryptography:
  • PQCrypto 2006. Katholieke Universiteit Leuven, Belgium, May 23--26, 2006. http://postquantum.cr.yp.to. Almost all of the accepted papers are available on the conference site.
  • PQCrypto 2008. University of Cincinnati, USA, October 17--19, 2008. http://math.uc.edu/~aac/pqcrypto2008/. All of the accepted papers are available in the proceedings: Johannes Buchmann, Jintai Ding (editors). Post-quantum cryptography, second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17--19, 2008, proceedings. Lecture Notes in Computer Science 5299, Springer, 2008. ISBN 978-3-540-88402-6.
  • PQCrypto 2010. Darmstadt (close to Frankfurt), Germany, May 25--28, 2010. http://pqc2010.cased.de/.
  • PQCrypto 2011. Taipei, Taiwan, November 29--December 2, 2011. http://pq.crypto.tw/pqc11/.
  • PQCrypto 2013. Limoges, France, June 4--7, 2013. http://pqcrypto2013.xlim.fr/.
  • PQCrypto 2014. Institute for Quantum Computing, University of Waterloo, Canada, October 1--3, 2014. http://pqcrypto2014.uwaterloo.ca/.

Survey talks

The following presentations are available online:
  • PQCrypto 2008: Daniel J. Bernstein's invited talk "A brief survey of post-quantum cryptography" (PDF slides).
  • INDOCRYPT 2008: Tanja Lange's invited talk "Post-quantum cryptography" (PDF slides).

About this site

pqcrypto.org was founded by Daniel J. Bernstein and Tanja Lange. Bernstein added the bibliography. Pierre-Louis Cayrel and Christiane Peters contributed many references and URLs.

Version

This is version 2013.06.06 of the index.html web page.