Academic research on the potential impact of quantum computing dates back to at least 2001. A NIST published report from April 2016 cites experts that acknowledge the possibility of quantum technology to render the commonly used RSA algorithm insecure by 2030. As a result, a need to standardize quantum-secure cryptographic primitives was pursued. Since most symmetric primitives are relatively easy to modify in a way that makes them quantum resistant, efforts have focused on public-key cryptography, namely digital signatures and key encapsulation mechanisms. In December 2016 NIST initiated a standardization process by announcing a call for proposals.
The competition is now in its third round out of expected four, where in each round some algorithms are discarded and others are studied more closely. NIST hopes to publish the standardization documents by 2024, but may speed up the process if major breakthroughs in quantum computing are made.
Candidates moving on to the second round were announced on January 30, 2019. They are:
On July 22, 2020, NIST announced seven finalists ("first track"), as well as eight alternate algorithms ("second track"). The first track contains the algorithms which appear to have the most promise, and will be considered for standardization at the end of the third round. Algorithms in the second track could still become part of the standard, after the third round ends. NIST expects some of the alternate candidates to be considered in a fourth round. NIST also suggests it may re-open the signature category for new schemes proposals in the future.
On June 7–9, 2021, NIST conducted the third PQC standardization conference, virtually. The conference included candidates' updates and discussions on implementations, on performances, and on security issues of the candidates. A small amount of focus was spent on intellectual property concerns.
During this round, some candidates have shown to be vulnerable to some attack vectors. It forces these candidates to adapt accordingly:
CRYSTAL-Kyber and SABER
may change the nested hashes used in their proposals in order for their security claims to hold.
FALCON
side channel attack using electromagnetic measurements to extract the secret signing keys. A masking may be added in order to resist the attack. This adaptation affects performance and should be considered whilst standardizing.
On July 5, 2022, NIST announced the first group of winners from its six-year competition.
On July 5, 2022, NIST announced four candidates for PQC Standardization Round 4.
On March 11, 2025, NIST announced the selection of a backup algorithm for KEM.
On August 13, 2024, NIST released final versions of its first three Post Quantum Crypto Standards. According to the release announcement:
On March 11, 2025 NIST released HQC as the fifth algorithm for post-quantum asymmetric encryption as used for key encapsulation / exchange. The new algorithm is as a backup for ML-KEM, the main algorithm for general encryption. HQC is based on different math than ML-KEM, thus mitigating weakness if found. The draft standard incorporating the HQC algorithm is expected in early 2026 with the final in 2027.
NIST received 50 submissions and deemed 40 to be complete and proper according to the submission requirements. Under consideration are:
(strikethrough means it has been withdrawn)
NIST deemed 14 submissions to pass to the second round.
"Post-Quantum Cryptography PQC". 3 January 2017. https://csrc.nist.gov/projects/post-quantum-cryptography
"Post-Quantum Cryptography Standardization – Post-Quantum Cryptography". Csrc.nist.gov. 3 January 2017. Retrieved 31 January 2019. https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization
Moody, Dustin (24 November 2020). "The Future Is Now: Spreading the Word About Post-Quantum Cryptography". NIST. https://www.nist.gov/blogs/taking-measure/future-now-spreading-word-about-post-quantum-cryptography
"Final Submission received". Archived from the original on 29 December 2017. Retrieved 29 December 2017. https://web.archive.org/web/20171229232437/https://post-quantum.ch/
NIST Releases First 3 Finalized Post-Quantum Encryption Standards, NIST, August 13, 2024 https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
Hong, Zhu (2001). "Survey of Computational Assumptions Used in Cryptography Broken or Not by Shor's Algorithm" (PDF). http://crypto.cs.mcgill.ca/~crepeau/PDF/memoire-hong.pdf
"NIST Released NISTIR 8105, Report on Post-Quantum Cryptography". 21 December 2016. Retrieved 5 November 2019. https://csrc.nist.gov/News/2016/NIST-Released-NISTIR-8105,-Report-on-Post-Quantum
"NIST Asks Public to Help Future-Proof Electronic Information". NIST. 20 December 2016. Retrieved 5 November 2019. https://www.nist.gov/news-events/news/2016/12/nist-asks-public-help-future-proof-electronic-information
Computer Security Division, Information Technology Laboratory (3 January 2017). "Round 1 Submissions – Post-Quantum Cryptography – CSRC". Csrc.nist.gov. Retrieved 31 January 2019. https://csrc.nist.gov/Projects/Post-Quantum-Cryptography/Round-1-Submissions
"NIST Post Quantum Crypto Submission". Archived from the original on 29 December 2017. Retrieved 29 December 2017. https://web.archive.org/web/20171229114632/https://www.onboardsecurity.com/nist-post-quantum-crypto-submission
"Google Groups". Groups.google.com. Retrieved 31 January 2019. https://groups.google.com/a/list.nist.gov/forum/#!topic/pqc-forum/YsGkKEJTt5c
"NIST Post Quantum Crypto Submission". Archived from the original on 29 December 2017. Retrieved 29 December 2017. https://web.archive.org/web/20171229114632/https://www.onboardsecurity.com/nist-post-quantum-crypto-submission
qTESLA team. "Efficient and post-quantum secure lattice-based signature scheme". qTESLA.org. Archived from the original on 9 December 2023. Retrieved 4 March 2024. https://web.archive.org/web/20231209220840/https://qtesla.org/
"qTESLA". Microsoft Research. Archived from the original on 31 December 2022. Retrieved 4 March 2024. https://www.microsoft.com/en-us/research/project/qtesla/
"ROLLO". Pqc-rollo.org. Retrieved 31 January 2019. http://www.pqc-rollo.org/
RSA using 231 4096-bit primes for a total key size of 1 TiB. "Key almost fits on a hard drive"
Bernstein, Daniel (28 May 2010). "McBits and Post-Quantum RSA" (PDF). Retrieved 10 December 2019. /wiki/Daniel_J._Bernstein
Bernstein, Daniel; Heninger, Nadia (19 April 2017). "Post-quantum RSA" (PDF). Retrieved 10 December 2019. /wiki/Daniel_J._Bernstein
"Dear all, the following Python script quickly recovers the message from a given "Guess Again" ciphertext without knowledge of the private key" (PDF). Csrc.nist.gov. Retrieved 30 January 2019. https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/guess-again-official-comment.pdf
Panny, Lorenz (25 December 2017). "Fast key recovery attack against the "RVB" submission to #NISTPQC: t .... Computes private from public key". Twitter. Retrieved 31 January 2019. https://twitter.com/yx7__/status/945283780851400704
"Comments on RaCoSS". Archived from the original on 26 December 2017. Retrieved 4 January 2018. https://web.archive.org/web/20171226100156/https://helaas.org/racoss/
"Comments on HK17". Archived from the original on 5 January 2018. Retrieved 4 January 2018. https://web.archive.org/web/20180105070112/https://helaas.org/hk17/
"Dear all, We have broken SRTPI under CPA and TPSig under KMA" (PDF). Csrc.nist.gov. Retrieved 30 January 2019. https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/SRTPI-official-comment.pdf
Beullens, Ward; Blackburn, Simon R. (2018). "Practical attacks against the Walnut digital signature scheme". Cryptology ePrint Archive. https://eprint.iacr.org/2018/318
Kotov, Matvei; Menshov, Anton; Ushakov, Alexander (2018). "An attack on the walnut digital signature algorithm". Cryptology ePrint Archive. https://eprint.iacr.org/2018/393
Yu, Yang; Ducas, Léo (2018). "Learning strikes again: the case of the DRS signature scheme". Cryptology ePrint Archive. https://eprint.iacr.org/2018/294
Barelli, Elise; Couvreur, Alain (2018). "An efficient structural attack on NIST submission DAGS". arXiv:1805.05429 [cs.CR]. /wiki/ArXiv_(identifier)
Lequesne, Matthieu; Tillich, Jean-Pierre (2018). "Attack on the Edon-K Key Encapsulation Mechanism". arXiv:1802.06157 [cs.CR]. /wiki/ArXiv_(identifier)
Couvreur, Alain; Lequesne, Matthieu; Tillich, Jean-Pierre (2018). "Recovering short secret keys of RLCE in polynomial time". arXiv:1805.11489 [cs.CR]. /wiki/ArXiv_(identifier)
Bernstein, Daniel J.; Groot Bruinderink, Leon; Lange, Tanja; Lange, Lorenz (2017). "Hila5 Pindakaas: On the CCA security of lattice-based encryption with error correction". Cryptology ePrint Archive. https://eprint.iacr.org/2017/1214
"Official Comments" (PDF). Csrc.nist.gov. 13 September 2018. https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/Giophantus-official-comment.pdf
Debris-Alazard, Thomas; Tillich, Jean-Pierre (2018). "Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme". arXiv:1804.02556 [cs.CR]. /wiki/ArXiv_(identifier)
"I am afraid the parameters in this proposal have at most 4 to 6-bits security under the Information Set Decoding (ISD) attack" (PDF). Csrc.nist.gov. Retrieved 30 January 2019. https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-1/official-comments/McNie-official-comment.pdf
Lau, Terry Shue Chien; Tan, Chik How (31 January 2019). "Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation". In Inomata, Atsuo; Yasuda, Kan (eds.). Advances in Information and Computer Security. Lecture Notes in Computer Science. Vol. 11049. Springer International Publishing. pp. 19–34. doi:10.1007/978-3-319-97916-8_2. ISBN 978-3-319-97915-1. 978-3-319-97915-1
Computer Security Division, Information Technology Laboratory (3 January 2017). "Round 2 Submissions – Post-Quantum Cryptography – CSRC". Csrc.nist.gov. Retrieved 31 January 2019. https://csrc.nist.gov/projects/post-quantum-cryptography/round-2-submissions
Schwabe, Peter. "CRYSTALS". Pq-crystals.org. Retrieved 31 January 2019. https://pq-crystals.org/
"FrodoKEM". Frodokem.org. Retrieved 31 January 2019. https://frodokem.org/
Schwabe, Peter. "NewHope". Newhopecrypto.org. Retrieved 31 January 2019. https://newhopecrypto.org/
"NIST Post Quantum Crypto Submission". Archived from the original on 29 December 2017. Retrieved 29 December 2017. https://web.archive.org/web/20171229114632/https://www.onboardsecurity.com/nist-post-quantum-crypto-submission
"NTRU Prime: Intro". Archived from the original on 1 September 2019. Retrieved 30 January 2019. https://web.archive.org/web/20190901185114/https://ntruprime.cr.yp.to/
"Google Groups". Groups.google.com. Retrieved 31 January 2019. https://groups.google.com/a/list.nist.gov/forum/#!topic/pqc-forum/YsGkKEJTt5c
"SABER". Retrieved 17 June 2019. https://www.esat.kuleuven.be/cosic/pqcrypto/saber/index.html
"ThreeBears". SourceForge.net. Retrieved 31 January 2019. https://sourceforge.net/projects/threebears/
Schwabe, Peter. "CRYSTALS". Pq-crystals.org. Retrieved 31 January 2019. https://pq-crystals.org/
"Falcon". Falcon. Retrieved 26 June 2019. https://falcon-sign.info/
"BIKE – Bit Flipping Key Encapsulation". Bikesuite.org. Retrieved 31 January 2019. https://bikesuite.org/
"HQC". Pqc-hqc.org. Retrieved 31 January 2019. https://pqc-hqc.org/
"LEDAkem Key Encapsulation Module". Ledacrypt.org. Retrieved 31 January 2019. https://www.ledacrypt.org/LEDAkem/
"LEDApkc Public Key Cryptosystem". Ledacrypt.org. Retrieved 31 January 2019. https://www.ledacrypt.org/LEDApkc/
"NTS-Kem". Archived from the original on 29 December 2017. Retrieved 29 December 2017. https://web.archive.org/web/20171229103229/https://nts-kem.io/
"ROLLO". Pqc-rollo.org. Retrieved 31 January 2019. http://www.pqc-rollo.org/
"RQC". Pqc-rqc.org. Retrieved 31 January 2019. http://pqc-rqc.org/
"Sphincs". Sphincs.org. Retrieved 19 June 2023. https://sphincs.org/
"GeMSS". Archived from the original on 31 January 2019. Retrieved 30 January 2019. https://web.archive.org/web/20190131040055/https://www-polsys.lip6.fr/Links/NIST/GeMSS.html
"LUOV -- An MQ signature scheme". Retrieved 22 January 2020. https://www.esat.kuleuven.be/cosic/pqcrypto/luov/
"MQDSS post-quantum signature". Mqdss.org. Retrieved 31 January 2019. http://mqdss.org/
"SIKE – Supersingular Isogeny Key Encapsulation". Sike.org. Retrieved 31 January 2019. https://sike.org/
"Picnic. A Family of Post-Quantum Secure Digital Signature Algorithms". microsoft.github.io. Retrieved 26 February 2019. https://microsoft.github.io/Picnic/
Moody, Dustin; Alagic, Gorjan; Apon, Daniel C.; Cooper, David A.; Dang, Quynh H.; Kelsey, John M.; Liu, Yi-Kai; Miller, Carl A.; Peralta, Rene C.; Perlner, Ray A.; Robinson, Angela Y.; Smith-Tone, Daniel C.; Alperin-Sheriff, Jacob (2020). "Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process". doi:10.6028/NIST.IR.8309. S2CID 243755462. Retrieved 23 July 2020. https://csrc.nist.gov/publications/detail/nistir/8309/final
Third PQC Standardization Conference - Session I Welcome/Candidate Updates, 10 June 2021, retrieved 6 July 2021 https://www.nist.gov/video/third-pqc-standardization-conference-session-i-welcomecandidate-updates
Computer Security Division, Information Technology Laboratory (10 February 2021). "Third PQC Standardization Conference | CSRC". CSRC | NIST. Retrieved 6 July 2021. https://csrc.nist.gov/Events/2021/third-pqc-standardization-conference
"Submission Requirements and Evaluation Criteria" (PDF). https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/call-for-proposals-final-dec-2016.pdf
Beullens, Ward (2022). "Breaking Rainbow Takes a Weekend on a Laptop" (PDF). Eprint.iacr.org. https://eprint.iacr.org/2022/214.pdf
Grubbs, Paul; Maram, Varun; Paterson, Kenneth G. (2021). "Anonymous, Robust Post-Quantum Public Key Encryption". Cryptology ePrint Archive. https://eprint.iacr.org/2021/708
Karabulut, Emre; Aysu, Aydin (2021). "Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks". Cryptology ePrint Archive. https://eprint.iacr.org/2021/772
"NIST Announces First Four Quantum-Resistant Cryptographic Algorithms". NIST. 5 July 2022. Retrieved 9 July 2022. https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms
"Selected Algorithms 2022". CSRC | NIST. 5 July 2022. Retrieved 9 July 2022. https://csrc.nist.gov/Projects/post-quantum-cryptography/selected-algorithms-2022
"Round 4 Submissions". CSRC | NIST. 5 July 2022. Retrieved 9 July 2022. https://csrc.nist.gov/Projects/post-quantum-cryptography/round-4-submissions
"SIKE Team - Foreword and postscript" (PDF). https://csrc.nist.gov/csrc/media/Projects/post-quantum-cryptography/documents/round-4/submissions/sike-team-note-insecure.pdf
Goodin, Dan (2 August 2022). "Post-quantum encryption contender is taken out by single-core PC and 1 hour". Ars Technica. Retrieved 6 August 2022. https://arstechnica.com/information-technology/2022/08/sike-once-a-post-quantum-encryption-contender-is-koed-in-nist-smackdown/
https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8545.pdf https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8545.pdf
"NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption". NIST. 11 March 2025. Retrieved 20 May 2025. https://www.nist.gov/news-events/news/2025/03/nist-selects-hqc-fifth-algorithm-post-quantum-encryption
NIST Releases First 3 Finalized Post-Quantum Encryption Standards, NIST, August 13, 2024 https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
"NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption". NIST. 11 March 2025. Retrieved 20 May 2025. https://www.nist.gov/news-events/news/2025/03/nist-selects-hqc-fifth-algorithm-post-quantum-encryption
https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8545.pdf https://nvlpubs.nist.gov/nistpubs/ir/2025/NIST.IR.8545.pdf
Moody, Dustin (17 July 2023). "Onramp submissions are posted!". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/4zNPlO_NHas
"Digital Signature Schemes". csrc.nist.gov. 29 August 2022. Retrieved 17 July 2023. https://csrc.nist.gov/Projects/pqc-dig-sig/round-1-additional-signatures
"SMAUG & HAETAE - HAETAE". https://kpqc.cryptolab.co.kr/haetae
"Hufu". http://123.56.244.4/
"RACCOON – Not just a signature, a whole family of it !". https://raccoonfamily.org/
"masksign/raccoon: Raccoon Signature Scheme -- Reference Code". GitHub. https://github.com/masksign/raccoon/
"Squirrels - Introduction". https://www.squirrels-pqc.org/
"CROSS crypto". https://cross-crypto.com/
"FuLeeca: A Lee-based Signature Scheme - Lehrstuhl für Nachrichtentechnik". https://www.ce.cit.tum.de/lnt/forschung/professur-fuer-coding-and-cryptography/fuleeca/
"LESS project". https://www.less-project.com/
"MEDS". https://www.meds-pqc.org/
"WAVE". https://wave-sign.org/
"MIRA". https://pqc-mira.org/
"MiRitH". https://pqc-mirith.org/
"MQOM". https://www.mqom.org/
"PERK". https://pqc-perk.org/
"RYDE". https://pqc-ryde.org/
"SD-in-the-Head". https://sdith.org/
Smith-Tone, Daniel (17 July 2023). "OFFICIAL COMMENT: 3WISE". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/fsfGqHCgGvY
"Home". https://www.biscuit-pqc.org/
"OFFICIAL COMMENT: DME Key Recovery Attack". groups.google.com. Retrieved 10 September 2023. https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/aoXpl4TlNh4
"MAYO". https://pqmayo.org/
"PROV". https://prov-sign.github.io/
"QR-UOV". https://info.isl.ntt.co.jp/crypt/qruov/
"SNOVA". snova.pqclab.org. Retrieved 23 September 2023. https://snova.pqclab.org/
"TUOV". https://www.tuovsig.org/
"UOV". https://www.uovsig.org/
"VOX". https://vox-sign.com/
"SQIsign". https://sqisign.org/
"AIMer Signature". https://aimer-signature.org/
"Come and join the FAEST | FAEST Signature Algorithm". https://faest.info/
"ALTEQ". https://pqcalteq.github.io/
Smith-Tone, Daniel (17 July 2023). "OFFICIAL COMMENT: 3WISE". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/fsfGqHCgGvY
Tibouchi, Mehdi (17 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: EagleSign". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/zas5PLiBe6A
Bernstein, D.J. (17 July 2023). "OFFICIAL COMMENT: KAZ-SIGN". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/2ljDcgtawFw
Fluhrer, Scott (17 July 2023). "KAZ-SIGN". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/aCbi4BMDeUs
Panny, Lorenz (17 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: Xifrat1-Sign.I". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/9FXtBZKWueA
Tibouchi, Mehdi (18 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: EagleSign". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/zas5PLiBe6A/m/EVmNzzglBQAJ
Panny, Lorenz. "Round 1 (Additional Signatures) OFFICIAL COMMENT: EagleSign". groups.google.com. Retrieved 13 May 2025. https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/zas5PLiBe6A/m/AKIzf2q8BgAJ
Beullens, Ward (18 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: HPPC". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KRh8w03PW4E
Perlner, Ray (21 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: HPPC". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KRh8w03PW4E/m/IYGDdEJEBgAJ
Saarinen, Markku-Juhani O. (18 July 2023). "OFFICIAL COMMENT: ALTEQ". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/-LCPCJCyLlc
Bouillaguet, Charles (19 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: Biscuit". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/sw8NueiNek0
Niederhagen, Ruben (19 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: MEDS". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/CtCe8WXUoXI/m/jgWQ0ia7BQAJ
van Woerden, Wessel (20 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: FuLeeca". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KvIege2EbuM
Persichetti, Edoardo (21 July 2023). "OFFICIAL COMMENT: LESS". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Z36SPZJI8Ok
Saarinen, Markku-Juhani O. "Round 1 (Additional Signatures) OFFICIAL COMMENT: DME-Sign". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/E0mMMGI5eWE
"OFFICIAL COMMENT: DME Key Recovery Attack". groups.google.com. Retrieved 10 September 2023. https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/aoXpl4TlNh4
van Woerden, Wessel (25 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: EHTv3". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/mFl_5Rq6-RU
Suhl, Adam (29 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: EHT". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/bkJKBFq3TDY
VASSEUR, Valentin (29 July 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: Enhanced pqsigRM". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/yQ1CKOLbGng
"Round 1 (Additional Signatures) OFFICIAL COMMENT: Enhanced pqsigRM". groups.google.com. Retrieved 30 September 2023. https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/4_nUCDvDqqs
Saarinen, Markku-Juhani O. (27 July 2023). "Buffer overflows in HAETAE / On crypto vs implementation errors". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ImcSqGLFdoo
Saarinen, Markku-Juhani O. (29 July 2023). "HuFu: Big-flipping forgeries and buffer overflows". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Hq-wRFDbIaU
Carrier, Kevin (3 August 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: SDitH". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/d_BcUfFGl5o
Carrier, Kevin; Hatey, Valérian; Tillich, Jean-Pierre (5 December 2023). "Projective Space Stern Decoding and Application to SDitH". arXiv:2312.02607 [cs.IT]. /wiki/ArXiv_(identifier)
Furue, Hiroki (28 August 2023). "Round 1 (Additional Signatures) OFFICIAL COMMENT: VOX". https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/icHfTrzkfw4
Liu, Fukang; Mahzoun, Mohammad; Øygarden, Morten; Meier, Willi (10 November 2023). "Algebraic Attacks on RAIN and AIM Using Equivalent Representations". IACR ePrint (2023/1133). https://eprint.iacr.org/2023/1133
Ikematsu, Yasuhiko; Akiyama, Rika (2024), Revisiting the security analysis of SNOVA, retrieved 28 January 2024 https://eprint.iacr.org/2024/096
Ferreira, River Moreira; Perret, Ludovic (2024), Polynomial-Time Key-Recovery Attack on the ${\tt NIST}$ Specification of ${\tt PROV}$, retrieved 4 April 2024 https://eprint.iacr.org/2024/279
Moody, Dustin (24 October 2024). "Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process". https://csrc.nist.gov/pubs/ir/8528/final
"CROSS crypto". https://cross-crypto.com/
"LESS project". https://www.less-project.com/
"Mirath". https://pqc-mirath.org/
"MQOM". https://www.mqom.org/
"PERK". https://pqc-perk.org/
"RYDE". https://pqc-ryde.org/
"SD-in-the-Head". https://sdith.org/
"MAYO". https://pqmayo.org/
"QR-UOV". https://info.isl.ntt.co.jp/crypt/qruov/
"SNOVA". snova.pqclab.org. Retrieved 23 September 2023. https://snova.pqclab.org/
"UOV". https://www.uovsig.org/
"SQIsign". https://sqisign.org/
"Come and join the FAEST | FAEST Signature Algorithm". https://faest.info/