1 |
Google Blog, "Announcing the first SHA1 collision," https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html, February 2017.
|
2 |
Mathy Vanhoef and Frank Piessens, Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2," In Proceedings of the 2017 ACM Computer and Communication Security(CCS), pp1313-1328, Dallas, Tx, USA, November 2017
|
3 |
Ben Seri and Gregory Vishnepolsky "Blueborne - A New Class of Airborne Attacks That Can Remotely Compromise Any Linux/IoT Device," Black Hat Europe 2017, London,UK, December 2017
|
4 |
Neel Mehta, "The Heartbleed Bug," CVE-2014-0160, April 2014
|
5 |
Bodo Moller, Thai Duong and Krzysztof Kotowicz, "This POODLE Bites: Exploiting The SSL 3.0 Fallback," CVE-2014-3566, September 2014
|
6 |
Peter W Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM Journal on Computing 26.5, pp.1484-1509, 1997
DOI
|
7 |
Lov K. Grover, "A fast quantum mechanical algorithm for database search," In Proceedings of the 28th Annual ACM Symposium on the Theory of Computing(STC), pp.212-219, New York, NY, USA, July 1996
|
8 |
양자내성암호연구단, https://kpqc.or.kr
|
9 |
NIST Post-Quantum Cryptography Project, https://csrc.nist.gov/projects/post-quantum-cryptography
|
10 |
Willian Barker, William Polk and Murugiah Souppaya, "Getting Ready for Post-quantum Cryptography: Exploring Challenges Associated with Adoption and Using Post-Quantum Cryptographic Algorithms", NIST CSWP 15, April 2021
|
11 |
Panos Kampanakis, Peter Panburana, Ellie Daw and Daniel Van Geest, "The Viability of Post-Quantum X.509 Certificates," IACR Cryptology ePrint, January 2018
|
12 |
NIST NCCOE, "Migration to Post-quantum Cryptography", https://www.nccoe.nist.gov/sites/default/files/2022-07/pqc-migration-project-description-final.pdf
|
13 |
NCSC UK, "Protocol Design Principles", https://ncsc.gov.uk/whitepaper/protocol-design-principles, NCSC UK Whitepaper, December 2020
|
14 |
ANSSI, "ANSSI views on the Post-Quantum Cryptography transition", https://ssi.gouv.fr/en/publications/anssi-technical_position_paper-post_quantum_cryptography_transition, ANSSI Technical Position Papers, January 2001
|
15 |
Hassane Aissaoui Mehrez and Othmane El Omri, "The Crypto Agility Properties", In Proceedings of The 12th International Multi-Conference on Society, Cybernetics and Informatics (IMSCI), pp.99-103, Orlando, FL, USA, July 2018
|
16 |
Olaf Grote, Andreas Ahrens and Cesar Benavente-Peces, "A Review of Post- Quantum Cryptography and Crypto-agility Strategies", In Proceedings of 2019 International Interdisciplinary PhD Workshop (IIPhDW), pp115-120, Wismar, Germany, May
|
17 |
Chujiao Ma, Luis Colon, Joe Dera, Bahman Rashidi, and Vaibhav Garg "CARAF: Crypto Agility Risk Assessment Framework", Journal of Cybersecurity, vol. 7, no 1. pp. 1-11, May 2021
|
18 |
Cryptosense, "Cryptosense Analyzer Platform". https://cryptosense.com/analyzer
|
19 |
Infosec Global, "Control Your Cryptography With Crypto Agility Management", https://infosecglobal.com
|
20 |
Senetas, "Bringing Agility to Cryptography", https://www.senetas.com/cybersecurity-challenges/why-encrypt/crypto-agility
|
21 |
Cryptomathic, "CSG Overview", https://www.cryptomatic.com/products/key-management/crypto-service-gateway
|
22 |
Tyson Macaulay and Richard Henderson, "Cryptographic Agility in Practice-emerging use-case," https://assets.website-files.com/612fec6a451c71c9308f4b69/614b712e53ce8f7fad0c3c4a_ISG_AgilityUseCases_Whitepaper-FINAL.pdf, Infosec Global Whitepaper, 2019
|