
Examples include ETSI TC CYBER WG QSC's "Migration strategies and recommendations for Quantum Safe schemes" [i.2] and the "Preparing for Post-Quantum Cryptography" roadmap …
ETSI TS 104 015 V1.1.1 (2025-02) TECHNICAL SPECIFICATION Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with …
ETSI TS 103 744 V1.2.1 (2025-03) TECHNICAL SPECIFICATION CYBER; Quantum-Safe Cryptography (QSC); Quantum-safe Hybrid Key Establishment Reference RTS/CYBER-QSC …
ETSI TR 103 966 V1.1.1 (2024-10) TECHNICAL REPORT CYBER Security (CYBER); Quantum-Safe Cryptography (QSC); Deployment Considerations for Hybrid Schemes Reference …
The present document supplements ETSI GR QSC 006 [i.1] by summarizing quantum resource estimates for attacks against widely used symmetric algorithms with reasonable circuit depth …
For X.509 based PKI systems it is possible to migrate to the QSC end-state by hybridising the cryptographic modes, allowing classical and QSC modes to co-exist. The migration plan …
The European Commission has recently granted funding to two QSC projects under the Horizon 2020 framework: SAFEcrypto [i.2] and PQCrypto [i.3] and [i.4]. The present document draws …
TECHNICAL SPECIFICATION CYBER; Quantum-safe Hybrid Key Exchanges Reference DTS/CYBER-QSC-0015 Keywords key exchange, quantum safe cryptography
Every vehicle in the ExVe domain will require to be updated with support for the selected QSC algorithm. Each unique key pair in the system will require to be updated as appropriate to the …
Although not widely used, it is also possible to construct a key exchange from a key transport mechanism. The key transport mechanisms described in ETSI GR QSC 001 [i.2] are based on …