CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Quantum-Safe Security Governance with the Cloud Controls Matrix For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa... Request to download | |
Quantum-Safe Security Working Group Charter 2023 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co... Request to download | |
Getting Quantum Safe in 5 Slides This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste... Request to download | |
Blockchains in the Quantum Era - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Practical Preparations for the Post-Quantum World This document discusses the cybersecurity challenges and recommended steps to reduce likely new risks due to quantum information sciences. This paper was ... Request to download | |
Confidence in Post Quantum Algorithms NIST made the recent announcement of its Round 3 candidates for future post-quantum cryptography or quantum safe standards. As the world prepares to transiti... Request to download | |
Blockchains in the Quantum Era Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel... Request to download | |
Quantum-Safe Security Working Group Charter The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum compu... Request to download | |
Mitigating the Quantum Threat with Hybrid Cryptography Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu... Request to download | |
Preparing Enterprises for the Quantum Computing Cybersecurity Threats Quantum computing, while expected to help make many advancements, will also break the existing asymmetric-key cryptosystems, thus endangering our security in... Request to download | |
The State of Post-Quantum Cryptography Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes... Request to download | |
A Day Without Safe Cryptography Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac... Request to download | |
Quantum-Safe Security Awareness Survey Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant... Request to download | |
Applied Quantum Safe Security Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern... Request to download | |
Quantum Safe Security Glossary The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ... Request to download | |
Quantum Random Number Generators A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent... Request to download | |
What is Post-Quantum Cryptography Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an ... Request to download | |
What is Quantum Key Distribution? The security of QKD relies on fundamental laws of nature, which are invulnerable to increasing computational power, new attack algorithms or quantum computer... Request to download | |
What is Quantum Safe Security An overview of current cryptographic techniques being used, proactive defenses, and the threats and impact of quantum computing. Request to download |