Where every claim in SecProve
comes from.
A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.
The canonical quantum computing textbook. Covers qubits, gates, circuits, algorithms, and error correction. The reference for foundational questions — use judiciously as this is deeply technical.
Test your knowledge · D1Federal guidance on preparing for quantum threats. Cryptographic inventory requirements, risk assessment methodology, and migration prioritization. Practical governance questions.
Practical guidance for cloud providers and enterprises on quantum-safe migration. Covers certificate management, key negotiation, and hybrid deployment models.
Test your knowledge · D6Standards for QKD deployment: interfaces, security proofs, network architecture. The main standardization effort for quantum networking.
Test your knowledge · D5European Telecommunications Standards Institute guide to quantum key distribution. Covers BB84, E91, and practical deployment considerations.
Test your knowledge · D5Expert survey on when quantum computers will break RSA-2048. Tracks annual probability estimates from leading researchers.
Test your knowledge · D3Quantum supremacy paper (Sycamore, 2019), quantum error correction milestones. Primary source for state-of-the-art capability questions.
Test your knowledge · D1Free courses on quantum computing fundamentals, from qubits and gates to quantum algorithms. Includes hands-on access to real quantum computers.
Test your knowledge · D1Open-source textbook teaching quantum computing through code. Covers linear algebra, quantum circuits, Shor's algorithm, and Grover's algorithm.
Test your knowledge · D1RFC 9180 (HPKE), draft standards for hybrid TLS key exchange, PQ/T hybrid certificates. The engineering details of how PQC gets deployed in real protocols. Questions on protocol-level migration decisions.
Test your knowledge · D6Introduction to quantum computing concepts and Q# programming language. Covers quantum mechanics, algorithms, and applications.
Test your knowledge · D1Step-by-step preparation guide: discovery (find all crypto), assessment (prioritize), planning (migration strategy). Practical engineering questions about organizational preparation.
Test your knowledge · D6NIST's primary post-quantum key encapsulation mechanism standard. Based on the CRYSTALS-Kyber algorithm. Replaces RSA/ECDH key exchange.
Test your knowledge · D2NIST's primary post-quantum digital signature standard. Based on CRYSTALS-Dilithium. Replaces RSA/ECDSA signatures.
Test your knowledge · D2Hash-based post-quantum signature standard. Conservative choice based on well-understood hash function security. Backup to ML-DSA.
Test your knowledge · D2Detailed technical analysis of the post-quantum cryptographic algorithms evaluated in NIST's third round. Essential for understanding algorithm selection rationale.
Test your knowledge · D6Transition guidance for cryptographic algorithms. Established precedent for how NIST manages algorithm deprecation (e.g., SHA-1, DES). Informs questions about how PQC transition will be mandated.
Test your knowledge · D4Migration guidance and timelines. Deprecation schedule for current algorithms. Hybrid approaches. The roadmap document for PQC transition questions.
NSA's mandated quantum-resistant algorithm suite for national security systems. Defines transition timelines for all classified communications.
Test your knowledge · D4NSA's guidance on quantum threats to cryptography. Explains which algorithms are vulnerable and timelines for transition.
Test your knowledge · D3White House memo requiring federal agencies to inventory cryptographic systems and begin migration to quantum-resistant algorithms.
Test your knowledge · D4Open-source C library implementing quantum-safe cryptographic algorithms. Enables testing and integration of PQC into existing systems.
Test your knowledge · D2Bulletin on quantum threats to payment card security (AES, RSA in payment protocols). Sector-specific compliance questions for financial services PQC migration.
Test your knowledge · D4DOE's blueprint for a quantum internet. Five milestones from verification of entanglement to fault-tolerant quantum networking. Questions on quantum network architecture and its security properties.
Test your knowledge · D5US strategy for quantum R&D. NQI Act of 2018, reauthorized 2024. Context for policy questions about national quantum strategies and investment.
Test your knowledge · D1Mosca's theorem: if the time to migrate (x) + shelf life of data (y) > time to quantum computer (z), then start migration now. The canonical framework for "harvest now, decrypt later" risk assessment.
Test your knowledge · D3Practical risk assessment framework for organizations. Combines timeline estimates with crypto-agility assessment. Good for enterprise-focused quantum security planning questions.
Test your knowledge · D6The first quantum key distribution (QKD) protocol. Foundational for all quantum networking questions. Security based on quantum mechanics (no-cloning theorem, measurement disturbance).
Test your knowledge · D5Survey of PQC families: lattice, code-based, multivariate, hash-based, isogeny-based. Good for comparative questions on different PQC approaches and their security assumptions.
Test your knowledge · D2Entanglement-based QKD. Security based on Bell inequality violations. Compare/contrast with BB84 for protocol design questions.
Test your knowledge · D5Quadratic speedup for unstructured search. Halves the effective key length of symmetric algorithms (AES-128 → 64-bit equivalent). Questions on what Grover's algorithm does and doesn't break.
Test your knowledge · D3The paper that started it all. Shor's algorithm breaks RSA, DSA, ECDSA, and Diffie-Hellman. Essential for questions on which classical cryptographic assumptions quantum computing breaks.
Test your knowledge · D3Six stages of quantum internet development from trusted repeater to full quantum computing network. Defines the maturity model for quantum networking questions.
Test your knowledge · D5Practical frameworks for achieving cryptographic agility: algorithm abstraction layers, protocol versioning, key management infrastructure updates. Vendor content but covers unique practical challenges.
Test your knowledge · D6Ready to test what you've learned?
Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.