Quantum computing is increasingly seen as a threat to communication security, rapid progress towards realizing practical quantum computer has drawn attention to many industries, such machines can break hard problem in modern cryptography infrastructure.We don’t yet know how hard it is to build a scalable, fault-tolerant quantum computer, but we should be prepared and understand the real impact of quantum computing on our networks' security. While quantum computing potential is so far firmly theoretical, the cryptography community is prepare for this possibility by developing Post-Quantum Cryptography, that is, a new class of cryptography algorithm resisting the increased capabilities of quantum computer. In this talk, I will present an overview about performance and challenges in implementation of Post-Quantum Cryptography.
For the information I missed in my presentation, you can see in these slides:
From my group:
High-Speed Hardware Architectures and Fair FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber
Optimized Software Implementations of CRYSTALS-Kyber, NTRU, and Saber Using NEON-Based Special Instructions of ARMv8
From embedded device (other research group):
Library for all platforms:
Some interesting researches from China, QKD and PQC: