diff --git a/README.md b/README.md index 2d925d1..641d9b5 100644 --- a/README.md +++ b/README.md @@ -27,6 +27,7 @@ It will be extended gradually as I find something of "must-have" value. Pull req * [Public key cryptography: Elliptic-curve crypto](#public-key-cryptography-elliptic-curve-crypto) - ECC, with focus on pratcial cryptosystems. * [Zero Knowledge Proofs](#zero-knowledge-proofs) - Proofs of knowledge and other non-revealing cryptosystems. * [Math](#math) - useful math materials in cryptographic context. + * [Post-quantum cryptography](#post-quantum-cryptography) - Cryptography in post-quantum period. * [Books](#books) * [Lectures and educational courses](#lectures-and-educational-courses) * [Online crypto challenges](#online-crypto-challenges) @@ -44,6 +45,7 @@ It will be extended gradually as I find something of "must-have" value. Pull req * [An Overview of Cryptography](http://www.garykessler.net/library/crypto.html) - By Gary C. Kessler. * [Using Encryption for Authentication in Large Networks](http://inst.eecs.berkeley.edu/~cs268/sp02/cached_papers/needham.pdf) - By Needham, Schroeder: this is were crypto-based auth starts. +* [Communication Theory of Secrecy Systems](http://netlab.cs.ucla.edu/wiki/files/shannon1949.pdf) - Fundamental cryptography paper by Claude Shannon #### General cryptographic interest @@ -136,6 +138,12 @@ Galois/Counter Mode (GCM) of Operation](https://eprint.iacr.org/2004/193.pdf) - * [PRIMES is in P](https://www.cse.iitk.ac.in/users/manindra/algebra/primality_v6.pdf) - Unconditional deterministic polynomial-time algorithm that determines whether an input number is prime or composite. +#### Post-quantum cryptography + +* [Post-quantum cryptography - dealing with the fallout of physics success](https://eprint.iacr.org/2017/314.pdf) - Brief observation of mathematical tasks that can be used to build cryptosystems secure against attacks by post-quantum computers +* [Post-quantum cryptography](https://www.researchgate.net/profile/Nicolas_Sendrier/publication/226115302_Code-Based_Cryptography/links/540d62d50cf2df04e7549388/Code-Based-Cryptography.pdf) - Introduction to post-quantum cryptography +* [Post-quantum RSA](https://cr.yp.to/papers/pqrsa-20170419.pdf) - Daniel Bernshtein's insight how to save RSA in post-quantum period +