CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
The State of Post-Quantum Cryptography Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes... Request to download | |
A Day Without Safe Cryptography Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac... Request to download | |
Using Blockchain Technology to Secure the Internet of Things In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro... Request to download | |
Quantum-Safe Security Awareness Survey Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant... Request to download | |
Blockchain/Distributed Ledger Working Group Glossary Blockchain is a radical, evolving technology and there is little awareness or knowledge regarding security aspects or compliance implications among many t... Request to download | |
Observations and Recommendations on Connected Vehicle Security The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real... Request to download | |
Applied Quantum Safe Security Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern... Request to download | |
Establishing a Safe and Secure Municipal Drone Program This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol... Request to download | |
Quantum Safe Security Glossary The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ... Request to download | |
Future Proofing the Connected World An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download | |
Quantum Random Number Generators A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent... Request to download | |
What is Post-Quantum Cryptography Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an ... Request to download | |
What is Quantum Key Distribution? The security of QKD relies on fundamental laws of nature, which are invulnerable to increasing computational power, new attack algorithms or quantum computer... Request to download | |
What is Quantum Safe Security An overview of current cryptographic techniques being used, proactive defenses, and the threats and impact of quantum computing. Request to download | |
New Security Guidance for Early Adopters of the IoT This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ai... Request to download | |
SDP Specification v1.0 This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge... Request to download |