https://doi.org/10.17487/RFC4035 Updated by RFCs 4470, 6014, 6840, 8198.
[7]
R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. 2005. Resource Records
for the DNS Security Extensions. RFC 4034 (Proposed Standard). , 29 pages.
https://doi.org/10.17487/RFC4034 Updated by RFCs 4470, 6014, 6840, 6944.
[8]
F. Arute, K. Arya, and R. et al Babbush. 2019. Quantum Supremacy Using a
Programmable Superconducting Processor. Nature 574 (oct 2019), 505ś510.
[9]
Magali Bardet, Maxime Bros, Daniel Cabarcas, Philippe Gaborit, Ray Perlner,
Daniel Smith-Tone, Jean-Pierre Tillich, and Javier Verb el. 2020. Improvements
of Algebraic Attacks for solving the Rank Decoding and MinRank problems.
arXiv:cs.CR/2002.08322
[10]
Elaine Barker. 2020. Recommendation for Key Management: Part 1 ś General.
Special Publication 800-57 P.1 Rev.5.
[11]
D.J. Bernstein, C. Dobraunig, M. Eichlseder, S. Fluhrer, S.L. Gazdag, A. Hülsing, P.
Kampanakis, S. Kölbl, T. Lange, M.M. Lauridsen, F. Mendel, R. Niederhagen, C.
Rechberger, J. Rijneveld, and P. Schwabe. 2017. Sphincs+. https://sphincs.org/da
ta/sphincs+-specication.pdf.
[12]
D. J. Bernstein and Tanja Lange. 2020. eBACS: ECRYPT Benchmarking of Crypto-
graphic Systems. https://bench.cr.yp.to/results-sign.html. Skylake (506e3)-sand.
[13]
W. Beullens, B. Preneel, A. Szepieniec, and F. Vercauteren. 2019. LUOV; Signature
Scheme proposal for NIST PQC Project.
[14]
Nina Bindel, Udyani Herath, Matthew McKague, and Douglas Stebila. 2017. Tran-
sitioning to a Quantum-Resistant Public Key Infrastructure. In Post-Quantum
Cryptography, Tanja Lange and Tsuyoshi Takagi (Eds.). Springer International
Publishing, Cham, 384ś405.
[15]
A. Casanova, J.C. Faugère, G. Macario-Rat, J. Patarin, L. Perret, and J. Ryckeghem.
2019. GeMSS: A Great Multivariate Short Signature. www-polsys.lip6.fr/Links/N
IST/GeMSS{_}specication{_}round2.pdf.
[16]
A. Casanova, J.C. Faugère, G. Macario-Rat, J. Patarin, L. Perret, and J. Ryckeghem.
2020. GeMSS: A Great Multivariate Short Signature. https://www-polsys.lip6.fr/L
inks/NIST/changes{_}round2{_}V2.pdf.
[17]
M. Chase, D. Derler, S. Goldfeder, J. Katz, V. Kolesnikov, C. Orlandi, S. Ramacher, C.
Rechberger, D. Slamanig, X. Wang, and G. Zaverucha. 2019. The Picnic Signature
Scheme, Design Document v2.1. https://github.com/microsoft/Picnic/blob/master/
spec/design-v2.1.pdf.
[18]
Lily Chen, Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta,
Ray Perlner, and Daniel Smith-Tone. 2016. Rep ort on Post-Quantum Cryptography.
US Department of Commerce, National Institute of Standards and Te chnology.
[19]
Cloudare. 2019. ECDSA: The missing piece of DNSSEC. https://www.cloudfla
re.com/dns/dnssec/ecdsa-and-dnssec/.
[20]
Eric Crockett, Christian Paquin, and Douglas Stebila. 2019. Prototyping post-
quantum and hybrid key exchange and authentication in TLS and SSH. In NIST
2nd Post-Quantum Cryptography Standardization Conference 2019.
[21]
J. Damas, M. Gra, and P. Vixie. 2013. Extension Mechanisms for DNS (EDNS(0)).
RFC 6891 (Internet Standard). , 16 pages. https://doi.org/10.17487/RFC6891
[22]
Casey Deccio and Jacob Davis. 2019. DNS privacy in practice and preparation. In
Proceedings of the 15th International Conference on Emerging Networking Experi-
ments And Technologies. 138ś143.
[23]
J. Dickinson, S. Dickinson, R. Bellis, A. Mankin, and D. Wessels. 2016. DNS Trans-
port over TCP - Implementation Requirements. RFC 7766 (Proposed Standard). ,
19 pages. https://doi.org/10.17487/RFC7766 Updated by RFC 8490.
[24]
J. Ding, M.S. Chen, A. Petzoldt, D. Schmidt, and B.Y. Yang. [n. d.]. Rain-
bow. https://http://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Crypt
ography/documents/round-2/submissions/Rainbow-Round2.zip.
[25]
J. Ding, M.-S. Chen, Albrecht Petzoldt, and B.-Y. Schmidt, Dieter Yang. 2017.
Intellectual property statements Rainbow. https://csrc.nist.gov/CSRC/media/Pro
jects/Post-Quantum-Cryptography/documents/round-1/ip-statements/Rainbo
w-Statements.pdf.
[26]
Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, and Zheng Zhang. 2019.
Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme. IACR
Cryptol. ePrint Arch. 2019 (2019), 1490.
[27] DNS-Violations. 2020. DNS ag day 2020 . https://dnsflagday.net/2020/.
[28]
DNSCrypt. 2020. DNSCrypt: Frequently Asked Questions. https://dnscrypt.info/
faq.
[29]
L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, P. Schwabe, G. Seiler, and D. Stehlé.
2019. CRYSTALS-Dilithium, Algorithm Specications and Supporting Documenta-
tion. https://pq-crystals.org/dilithium/data/dilithium-specication-round2.pdf.
[30]
Pawel Foremski, Oliver Gasser, and Giovane CM Moura. 2019. DNS Observatory:
The Big Picture of the DNS. In Proceedings of the Internet Measurement Conference.
87ś100.
[31]
P.-A. Fouque, J. Hostein, P. Kirchner, V. Lyubashevsky, T. Pornin, T. Prest, T.
Ricosset, G. Seiler, W. Whyte, and Z. Zhang. [n. d.]. Falcon: Fast-Fourier Lattice-
based Compact Signatures over NTRU. https://falcon-sign.info/falcon.pdf.
[32]
Craig Gidney and Martin Ekerå. 2019. How to Factor 2048 bit RSA Integers in 8
Hours Using 20 Million Noisy Qubits. arXiv:1905.09749
[33]
R. Gieben and W. Mekking. 2014. Authenticated Denial of Existence in the DNS.
RFC 7129 (Informational). , 30 pages. https://doi.org/10.17487/RFC7129
[34]
L. Groot Bruinderink, A. Hülsing, T. Lange, and Y. Yarom. 2016. Flush, Gauss, and
Reload ś A Cache Attack on the BLISS Lattice-Based Signature Scheme. Springer
Berlin Heidelberg, 323ś345.
[35]
A. Herzberg and H. Shulman. 2013. Fragmentation Considered Poisonous, or:
One-domain-to-rule-them-all.org. In 2013 IEEE Conference on Communications
and Network Security (CNS). 224ś232.
[36]
P. Homan and P. McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484
(Proposed Standard). , 21 pages. https://doi.org/10.17487/RFC8484
[37]
P. Homan and J. Schlyter. 2012. The DNS-Based Authentication of Named
Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698
(Proposed Standard). , 37 pages. https://doi.org/10.17487/RFC6698 Updated by
RFCs 7218, 7671.
[38]
P. Homan and W.C.A. Wijngaards. 2012. Elliptic Curve Digital Signature
Algorithm (DSA) for DNSSEC. RFC 6605 (Proposed Standard). , 8 pages.
https://doi.org/10.17487/RFC6605
[39]
Jerey Hostein, Jill Pipher, and Joseph H. Silverman. 1998. NTRU: A Ring-Based
Public Key Cryptosystem. In Lecture Notes in Computer Science. Springer-Verlag,
267ś288.
[40]
Z. Hu, L. Zhu, J. Heidemann, A. Mankin, D. Wessels, and P. Homan. 2016.
Specication for DNS over Transport Layer Security (TLS). RFC 7858 (Proposed
Standard). , 19 pages. https://doi.org/10.17487/RFC7858 Updated by RFC 8310.
[41]
Huston, Geo. 2019. The State of DNSSEC Validation. https://blog.apnic.net
/2019/03/14/the-state-of-dnssec-validation/.
[42]
J. Jansen. 2009. Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG
Resource Records for DNSSEC. RFC 5702 (Proposed Standard). , 10 pages. https:
//doi.org/10.17487/RFC5702 Updated by RFC 6944.
[43]
D. Kales and G. Zaverucha. 2019. Forgery Attacks on MQDSSv2.0.
https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/
documents/round-2/ofcial-comments/MQDSS-round2-ocial-comment.pdf.
[44]
B. Laurie, G. Sisson, R. Arends, and D. Blacka. 2008. DNS Security (DNSSEC)
Hashed Authenticated Denial of Existence. RFC 5155 (Proposed Standard). ,
52 pages. https://doi.org/10.17487/RFC5155 Updated by RFCs 6840, 6944.
[45]
Sarah McCarthy, James Howe, Neil Smyth, Seamus Brannigan, and Máire O’Neill.
2019. BEARZ Attack FALCON: Implementation Attacks with Countermeasures
on the FALCON signature scheme. Cryptology ePrint Archive, Report 2019/478.
https://eprint.iacr.org/2019/478.
[46]
Moritz Müller, Jins de Jong, Maran van Heesch, Benno Overeinder, and Roland
van Rijswijk Deij. 2020. Measurement Code: Custom Performance Test. https:
//github.com/SIDN/pqc-dnssec-measurement.
[47]
Moritz Müller, Matthew Thomas, Duane Wessels, Wes Hardaker, Taejoong Chung,
Willem Toorop, and Roland van Rijswijk-Deij. 2019. Roll, Roll, Roll your Root:
A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover. In
Proceedings of the Internet Measurement Conference. 1ś14.
[48]
NLnet Labs. 2020. DNSThought Live Measurements. https://dnsthought.nlnetla
bs.nl/.
[49]
D. Ott, C. Peikert, and other workshop participants. 2019. Identifying Research
Challenges in Post Quantum Cryptography Migration and Cr yptographic Agility.
arXiv:1909.07353
[50]
J. Patarin. 1997. The Oil and Vinegar Signature Scheme. https://ci.nii.ac.jp/naid/
10028073837/en/. Dagstuhl Workshop on Cryptography (Sep 1997).
[51]
Ray Perlner and Daniel Smith-Tone. 2020. Rainbow Band Separation is Better
than we Thought. Cryptology ePrint Archive, Rep ort 2020/702. https://eprint.i
acr.org/2020/702.
[52]
Rod Rasmussen. 2019. SSAC Comment to NIST on Quantum Cryptography
Algorithms. https://www.icann.org/en/system/les/files/sac-107-en.pdf.
[53]
P. Ravi, M. Prasad Jhanwar, J. Howe, A. Chattopadhyay, and S. Bhasin. 2018. Side-
channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate.
Cryptology ePrint Archive, Report 2018/821. https://eprint.iacr.org/2018/821.
[54]
Peter W Shor. 1994. Polynomial Time Algorithms for Discrete Logarithms and
Factoring on a Quantum Computer. In International Algorithmic Number Theory
Symposium. Springer, 289ś289.
[55]
O. Sury and R. Edmonds. 2017. Edwards-Curve Digital Security Algorithm
(EdDSA) for DNSSEC. RFC 8080 (Proposed Standard). , 7 pages. https://doi.org/
10.17487/RFC8080
[56]
Rainbow team. 2020. Modied Parameters of Rainbow in Resp onse to a Rened
Analysis of the Rainbow Band Separation Attack by the NIST Team and the Recent
New MinRank attacks. https://sites.google.com/site/jintaiding/nist-papers.
[57]
Willem Toorop, Moritz Müller, and Taejoong Chung. 2019. Measuring the impact
of DNS Flag Day. https://blog.apnic.net/2019/08/19/measuring-the-impact-of-d
ns-flag-day/.
[58]
National Institute of Standards US Department of Commerce and Tech-
nology (NIST). 2016. Submission Requirements and Evaluation Cri-
teria for the Post-Quantum Cryptography Standardization Process.
https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/
documents/call-for-proposals-final-dec-2016.pdf.
[59]
National Institute of Standards US Department of Commerce and Technology
(NIST). 2020. Post-Quantum Cryptography: Round 2 Submissions. https://csrc.n
ist.gov/projects/post-quantum-cryptography/round-2-submissions.
[60]
Gijs Van Den Broek, Roland van Rijswijk-Deij, Anna Sperotto, and Aiko Pras. 2014.
DNSSEC meets real world: dealing with unreachability caused by fragmentation.
ACM SIGCOMM Computer Communication Review Volume 51 Issue 4, October 2020