Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-select1 of 4
Domains · Dall in pillar
34 sources · matching filters · sorted by citation density
Sort
DQuantum Technologies & Cybersecurity34 sources
01

The canonical quantum computing textbook. Covers qubits, gates, circuits, algorithms, and error correction. The reference for foundational questions — use judiciously as this is deeply technical.

ResearchIntermediateD1 · Quantum Computing FundamentalsNEW · 22d ago
Test your knowledge · D1
02

Federal guidance on preparing for quantum threats. Cryptographic inventory requirements, risk assessment methodology, and migration prioritization. Practical governance questions.

Test your knowledge · D3
03

Practical guidance for cloud providers and enterprises on quantum-safe migration. Covers certificate management, key negotiation, and hybrid deployment models.

Test your knowledge · D6
04

Standards for QKD deployment: interfaces, security proofs, network architecture. The main standardization effort for quantum networking.

FrameworkIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
05

European Telecommunications Standards Institute guide to quantum key distribution. Covers BB84, E91, and practical deployment considerations.

GuideAdvancedD5 · Quantum Networking & CommunicationNEW · 1mo ago
Test your knowledge · D5
06

Expert survey on when quantum computers will break RSA-2048. Tracks annual probability estimates from leading researchers.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 1mo ago
Test your knowledge · D3
07

Quantum supremacy paper (Sycamore, 2019), quantum error correction milestones. Primary source for state-of-the-art capability questions.

ResearchIntermediateD1 · Quantum Computing FundamentalsNEW · 22d ago
Test your knowledge · D1
08

Free courses on quantum computing fundamentals, from qubits and gates to quantum algorithms. Includes hands-on access to real quantum computers.

GuideFoundationalD1 · Quantum Computing FundamentalsNEW · 1mo ago
Test your knowledge · D1
09

Open-source textbook teaching quantum computing through code. Covers linear algebra, quantum circuits, Shor's algorithm, and Grover's algorithm.

GuideIntermediateD1 · Quantum Computing FundamentalsNEW · 1mo ago
Test your knowledge · D1
10

RFC 9180 (HPKE), draft standards for hybrid TLS key exchange, PQ/T hybrid certificates. The engineering details of how PQC gets deployed in real protocols. Questions on protocol-level migration decisions.

FrameworkIntermediateD6 · Quantum Security EngineeringNEW · 22d ago
Test your knowledge · D6
11

Introduction to quantum computing concepts and Q# programming language. Covers quantum mechanics, algorithms, and applications.

GuideFoundationalD1 · Quantum Computing FundamentalsNEW · 1mo ago
Test your knowledge · D1
12

Step-by-step preparation guide: discovery (find all crypto), assessment (prioritize), planning (migration strategy). Practical engineering questions about organizational preparation.

FrameworkIntermediateD6 · Quantum Security EngineeringNEW · 22d ago
Test your knowledge · D6
13

NIST's primary post-quantum key encapsulation mechanism standard. Based on the CRYSTALS-Kyber algorithm. Replaces RSA/ECDH key exchange.

FrameworkAdvancedD2 · Post-Quantum CryptographyNEW · 1mo ago
Test your knowledge · D2
14

NIST's primary post-quantum digital signature standard. Based on CRYSTALS-Dilithium. Replaces RSA/ECDSA signatures.

FrameworkAdvancedD2 · Post-Quantum CryptographyNEW · 1mo ago
Test your knowledge · D2
15

Hash-based post-quantum signature standard. Conservative choice based on well-understood hash function security. Backup to ML-DSA.

FrameworkAdvancedD2 · Post-Quantum CryptographyNEW · 1mo ago
Test your knowledge · D2
16

Detailed technical analysis of the post-quantum cryptographic algorithms evaluated in NIST's third round. Essential for understanding algorithm selection rationale.

Test your knowledge · D6
17

Transition guidance for cryptographic algorithms. Established precedent for how NIST manages algorithm deprecation (e.g., SHA-1, DES). Informs questions about how PQC transition will be mandated.

FrameworkIntermediateD4 · Quantum-Safe ComplianceNEW · 22d ago
Test your knowledge · D4
18

Migration guidance and timelines. Deprecation schedule for current algorithms. Hybrid approaches. The roadmap document for PQC transition questions.

Test your knowledge · D2
19

NSA's mandated quantum-resistant algorithm suite for national security systems. Defines transition timelines for all classified communications.

FrameworkAdvancedD4 · Quantum-Safe ComplianceNEW · 1mo ago
Test your knowledge · D4
20

NSA's guidance on quantum threats to cryptography. Explains which algorithms are vulnerable and timelines for transition.

GuideIntermediateD3 · Quantum Threats to Existing SystemsNEW · 1mo ago
Test your knowledge · D3
21

White House memo requiring federal agencies to inventory cryptographic systems and begin migration to quantum-resistant algorithms.

FrameworkIntermediateD4 · Quantum-Safe ComplianceNEW · 1mo ago
Test your knowledge · D4
22

Open-source C library implementing quantum-safe cryptographic algorithms. Enables testing and integration of PQC into existing systems.

ToolAdvancedD2 · Post-Quantum CryptographyNEW · 1mo ago
Test your knowledge · D2
23

Bulletin on quantum threats to payment card security (AES, RSA in payment protocols). Sector-specific compliance questions for financial services PQC migration.

FrameworkIntermediateD4 · Quantum-Safe ComplianceNEW · 22d ago
Test your knowledge · D4
24

DOE's blueprint for a quantum internet. Five milestones from verification of entanglement to fault-tolerant quantum networking. Questions on quantum network architecture and its security properties.

FrameworkIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
25

US strategy for quantum R&D. NQI Act of 2018, reauthorized 2024. Context for policy questions about national quantum strategies and investment.

FrameworkIntermediateD1 · Quantum Computing FundamentalsNEW · 22d ago
Test your knowledge · D1
26

Mosca's theorem: if the time to migrate (x) + shelf life of data (y) > time to quantum computer (z), then start migration now. The canonical framework for "harvest now, decrypt later" risk assessment.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3
27

Practical risk assessment framework for organizations. Combines timeline estimates with crypto-agility assessment. Good for enterprise-focused quantum security planning questions.

ResearchIntermediateD6 · Quantum Security EngineeringNEW · 22d ago
Test your knowledge · D6
28

The first quantum key distribution (QKD) protocol. Foundational for all quantum networking questions. Security based on quantum mechanics (no-cloning theorem, measurement disturbance).

ResearchIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
29

Survey of PQC families: lattice, code-based, multivariate, hash-based, isogeny-based. Good for comparative questions on different PQC approaches and their security assumptions.

ResearchIntermediateD2 · Post-Quantum CryptographyNEW · 22d ago
Test your knowledge · D2
30

Entanglement-based QKD. Security based on Bell inequality violations. Compare/contrast with BB84 for protocol design questions.

ResearchIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
31

Quadratic speedup for unstructured search. Halves the effective key length of symmetric algorithms (AES-128 → 64-bit equivalent). Questions on what Grover's algorithm does and doesn't break.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3
32

The paper that started it all. Shor's algorithm breaks RSA, DSA, ECDSA, and Diffie-Hellman. Essential for questions on which classical cryptographic assumptions quantum computing breaks.

ResearchIntermediateD3 · Quantum Threats to Existing SystemsNEW · 22d ago
Test your knowledge · D3
33

Six stages of quantum internet development from trusted repeater to full quantum computing network. Defines the maturity model for quantum networking questions.

ResearchIntermediateD5 · Quantum Networking & CommunicationNEW · 22d ago
Test your knowledge · D5
34

Practical frameworks for achieving cryptographic agility: algorithm abstraction layers, protocol versioning, key management infrastructure updates. Vendor content but covers unique practical challenges.

GuideIntermediateD6 · Quantum Security EngineeringNEW · 22d ago
Test your knowledge · D6

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.