Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
7 sources · matching filters · sorted by citation density
Sort
DQuantum Technologies & Cybersecurity7 sources
01

Federal guidance on preparing for quantum threats. Cryptographic inventory requirements, risk assessment methodology, and migration prioritization. Practical governance questions.

Test your knowledge · D3
02

Expert survey on when quantum computers will break RSA-2048. Tracks annual probability estimates from leading researchers.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 1mo ago
Test your knowledge · D3
03

Migration guidance and timelines. Deprecation schedule for current algorithms. Hybrid approaches. The roadmap document for PQC transition questions.

Test your knowledge · D2
04

NSA's guidance on quantum threats to cryptography. Explains which algorithms are vulnerable and timelines for transition.

GuideIntermediateD3 · Quantum Threats to Existing SystemsNEW · 1mo ago
Test your knowledge · D3
05

Mosca's theorem: if the time to migrate (x) + shelf life of data (y) > time to quantum computer (z), then start migration now. The canonical framework for "harvest now, decrypt later" risk assessment.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3
06

Quadratic speedup for unstructured search. Halves the effective key length of symmetric algorithms (AES-128 → 64-bit equivalent). Questions on what Grover's algorithm does and doesn't break.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3
07

The paper that started it all. Shor's algorithm breaks RSA, DSA, ECDSA, and Diffie-Hellman. Essential for questions on which classical cryptographic assumptions quantum computing breaks.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.