CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Quantum-Safe Security Governance with the Cloud Controls Matrix Release Date: 07/30/2024 For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa... Request to download |
![]() | Quantum-Safe Security Working Group Charter 2023 Release Date: 03/10/2023 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co... Request to download |
![]() | Getting Quantum Safe in 5 Slides Release Date: 04/19/2022 This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste... Request to download |
![]() | Blockchains in the Quantum Era - Chinese Translation Release Date: 02/06/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Practical Preparations for the Post-Quantum World Release Date: 10/19/2021 This document discusses the cybersecurity challenges and recommended steps to reduce likely new risks due to quantum information sciences. This paper was ... Request to download |
![]() | Confidence in Post Quantum Algorithms Release Date: 02/25/2021 NIST made the recent announcement of its Round 3 candidates for future post-quantum cryptography or quantum safe standards. As the world prepares to transiti... Request to download |
![]() | Blockchains in the Quantum Era Release Date: 02/05/2021 Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel... Request to download |
![]() | Quantum-Safe Security Working Group Charter Release Date: 07/07/2020 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum compu... Request to download |
![]() | Mitigating the Quantum Threat with Hybrid Cryptography Release Date: 06/17/2019 Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu... Request to download |
![]() | Preparing Enterprises for the Quantum Computing Cybersecurity Threats Release Date: 05/23/2019 Quantum computing, while expected to help make many advancements, will also break the existing asymmetric-key cryptosystems, thus endangering our security in... Request to download |
![]() | The State of Post-Quantum Cryptography Release Date: 05/23/2018 Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes... Request to download |
![]() | A Day Without Safe Cryptography Release Date: 04/19/2018 Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac... Request to download |
![]() | Quantum-Safe Security Awareness Survey Release Date: 01/26/2018 Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant... Request to download |
![]() | Release Date: 03/13/2017 Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern... Request to download |
![]() | Quantum Safe Security Glossary Release Date: 01/24/2017 The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ... Request to download |
![]() | Quantum Random Number Generators Release Date: 06/09/2016 A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent... Request to download |
![]() | What is Post-Quantum Cryptography Release Date: 09/28/2015 Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an ... Request to download |
![]() | What is Quantum Key Distribution? Release Date: 08/05/2015 The security of QKD relies on fundamental laws of nature, which are invulnerable to increasing computational power, new attack algorithms or quantum computer... Request to download |
![]() | Release Date: 05/19/2015 An overview of current cryptographic techniques being used, proactive defenses, and the threats and impact of quantum computing. Request to download |