Part 5 of 5

Curated
Resources

A hand-curated, annotated list of the most important PQC references — from academic foundations to standards documents, big-tech engineering write-ups, and community forums. Each link is briefly described so you know what you are getting before you click.

📄 Academic Foundations

📐
Gidney & Ekerå (2021) — "How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits"
The definitive modern resource estimate for breaking RSA-2048 with Shor's algorithm. Required reading for anyone framing the CRQC timeline. Published in Quantum 5, 433. arXiv:1905.09749.
AcademicarXiv
📖
Bernstein & Lange (2017) — "Post-quantum cryptography" (Nature)
Seminal survey article in Nature introducing the PQC landscape to a broad scientific audience. Covers the four main families and explains why each offers quantum resistance. An excellent starting point for newcomers to the field.
AcademicNature
📋
NIST IR 8105 — Report on Post-Quantum Cryptography (2016)
The foundational NIST report that launched the standardization competition. Explains why quantum computing threatens current cryptography and sets the requirements for PQC candidates. Useful historical context.
NISTReport
🔨
Castryck & Decru (2022) — "An Efficient Key Recovery Attack on SIDH"
The paper that broke SIKE (Supersingular Isogeny Diffie-Hellman) in classical polynomial time, eliminating a NIST Round 3 finalist overnight. A landmark in cryptanalysis and a reminder that all assumptions must be independently stress-tested.
AcademicSIKE broken
🛠️
Open Quantum Safe (OQS) — liboqs + OQS-OpenSSL + OQS-BoringSSL
Open-source project providing prototype implementations of PQC algorithms in C (liboqs), with forks of OpenSSL, BoringSSL, OpenSSH, and WireGuard. The go-to starting point for experimenting with PQC in real protocols. Not production-hardened; use only for testing and research.
Open SourceLibrary
📊
Mosca & Piani — Quantum Threat Timeline Report 2022 (Global Risk Institute)
Annual expert survey on the probability and timeline of a CRQC. Mosca's inequality explained and applied. ~1 in 7 chance by 2031; ~1 in 2 by 2036. Essential for board-level risk communication.
RiskSurvey
🔬
IACR ePrint Archive — PQC papers
The preprint server for cryptography research. Searching "post-quantum" yields the latest cryptanalysis, new algorithm proposals, and efficiency improvements before formal publication. Follow this to stay current on the research frontier.
AcademicPreprints

🏛️ NIST — Standards & Publications

🏆
NIST CSRC PQC Project — main portal
The authoritative hub for the NIST PQC standardization. Links to all FIPS documents, round documents, public comment archives, and news. Bookmark this.
NISTPortal
📜
FIPS 203 — ML-KEM (August 13, 2024)
The official standard for the Module-Lattice Key Encapsulation Mechanism (formerly CRYSTALS-Kyber). Specifies ML-KEM-512, ML-KEM-768, and ML-KEM-1024. Contains algorithm specification, security analysis, and test vectors.
FIPSFinalized
📜
FIPS 204 — ML-DSA (August 13, 2024)
The official standard for the Module-Lattice Digital Signature Algorithm (formerly CRYSTALS-Dilithium). Specifies ML-DSA-44, -65, and -87. The primary replacement for ECDSA and RSA-PSS.
FIPSFinalized
📜
FIPS 205 — SLH-DSA (August 13, 2024)
The official standard for the Stateless Hash-Based Digital Signature Algorithm (formerly SPHINCS+). 12 parameter sets from SHA2-128s to SHAKE-256s. Security based purely on hash function assumptions.
FIPSFinalized
📜
NIST SP 800-208 — Recommendation for Stateful Hash-Based Signature Schemes (2020)
Standardizes XMSS and LMS/HSS for use today in firmware and code signing. Includes guidance on key state management and HSM requirements. Available for immediate deployment.
NISTFinalized
📋
NIST IR 8413 — Status Report on the Third Round of the NIST PQC Standardization Process (2022)
Detailed technical analysis of all Round 3 finalists and alternates. Explains why Kyber, Dilithium, Falcon, and SPHINCS+ were selected and the cryptanalytic basis for each decision. Essential background reading.
NISTReport

🏢 Big-Tech Engineering Blogs

🌐
Cloudflare Blog — Post-Quantum tag
Cloudflare has produced the most comprehensive public engineering documentation of a real-world PQC deployment. Posts cover their Kyber/ML-KEM TLS deployment, performance benchmarks across global PoPs, client compatibility data, and implementation war stories. Essential reading for practitioners.
CloudflareProduction
🔍
Google Security Blog — Post-Quantum label
Google's posts on Chrome's X25519Kyber768 → X25519MLKEM768 rollout, V8 / TLS stack integration, and Android PQC plans. Includes performance data on real user traffic at scale. Also covers Google's Gemini infrastructure quantum-hardening roadmap.
GoogleChrome
🔵
IBM Research — Quantum-Safe Cryptography
IBM contributed to the development of CRYSTALS-Kyber and CRYSTALS-Dilithium (now ML-KEM and ML-DSA). Their blog covers algorithm design rationale, CBOM tooling (IBM Open Cryptography Workbench), and enterprise migration case studies. IBM Quantum Safe Explorer product documentation linked here.
IBMResearch
💬
Apple Security Research — iMessage PQ3 (2024)
Detailed technical write-up of Apple's PQ3 protocol for iMessage: ML-KEM-based ratchet providing periodic post-quantum re-keying. Achieves Level 3 security in their model (post-compromise quantum security). Contains protocol diagrams, threat model, and formal verification approach.
AppleDeployed
🔔
Signal — PQXDH: Post-Quantum Extended Diffie-Hellman (2023)
Signal's blog post introducing PQXDH, which adds ML-KEM-1024 to the initial key establishment phase of Signal Protocol. Achieves post-quantum forward secrecy against HNDL for messages sent after PQXDH establishment. Clear explanation of the threat model and design decisions.
SignalDeployed
☁️
AWS — Post-Quantum Cryptography Hub
AWS's PQC documentation hub: ML-KEM in S2N-TLS, AWS KMS PQ preview, CloudFront hybrid TLS, and the open-source S2N-TLS and AWS-LC libraries with PQC support. Includes migration guidance for AWS-hosted workloads.
AWSCloud
🪟
Microsoft Research — Post-Quantum Cryptography
Microsoft Research's PQC project page: SymCrypt PQC integration, ML-KEM / ML-DSA in Windows, and research on topological qubits (Majorana). Azure Quantum documentation on the timeline. SymCrypt (Windows crypto library) already includes ML-KEM and ML-DSA.
MicrosoftResearch

Ready to act?

Start with the Migration Playbook for a structured approach, or contact Qifei Li for a tailored cryptographic architecture review and PQC readiness assessment.