CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Quantum Safe Security Glossary The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ... Request to download | |
Future Proofing the Connected World An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download | |
Quantum Random Number Generators A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent... Request to download | |
What is Post-Quantum Cryptography Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an ... Request to download | |
What is Quantum Key Distribution? The security of QKD relies on fundamental laws of nature, which are invulnerable to increasing computational power, new attack algorithms or quantum computer... Request to download | |
What is Quantum Safe Security An overview of current cryptographic techniques being used, proactive defenses, and the threats and impact of quantum computing. Request to download | |
New Security Guidance for Early Adopters of the IoT This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ai... Request to download | |
SDP Specification v1.0 This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge... Request to download |