| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)035005 | LS from GlobalPlatform to ETSI Cyber about Hybrid scheme for KEM | Available | ETSI | LSin |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)035004 | LS from ITU-T JCA-QKDN | Available | ETSI | LSin |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)035003 | CYBERQSC Meeting Report #34 | Available | ISARA | Report |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)035002 | CYBERQSC 35 Meeting Invitation | Available | ETSI | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)035001 | Meeting Agenda | Reserved | Amazon Web Services | Agenda |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034021 | Draft - DTR/CYBER-QSC-0021 v0.0.11 "Deployment considerations for hybrid schemes" | Accepted | NCSC | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034020 | Reply from ISG QKD on Quantum Safe Cryptographic Protocol Inventory | Available | ETSI | LSin |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034019 | SBOM TR - Latest Drart | Available | Rapporteur | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034018r2 | Proposed update to CYBER-QSC-0021 "Deployment considerations for hybrid schemes" | Available | NCSC | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034018r1 | Proposed update to CYBER-QSC-0021 "Deployment considerations for hybrid schemes" | Revised | NCSC | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034018 | Proposed update to CYBER-QSC-0021 "Deployment considerations for hybrid schemes" | Revised | NCSC | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034017 | SBOM/CBOM Standards overview | Available | IBM Europe | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034016 | EISMEA 1/2024 QSC submitted proposal | Available | ETSI | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034015 | Draft - DTR/CYBER-QSC-0020 v1.0.1 (TR 103 965 ) "Impact of Quantum Computing on Cryptographic Security Proofs" | Accepted | TNO | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034014 | EISMEA 1/2024 Call for proposals | Available | ETSI | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034013 | cryptographic-inventory-1.0.schema.json | Available | SandboxAQ | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034012 | Draft - DMI/CYBER-QSC-0010 v0.0.25 "CYBER QSC Extended Roadmap" | Available | ISARA | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034011 | Draft - DTR/CYBER-QSC-0020 v1.0.0 (TR 103 965 ) "Impact of Quantum Computing on Cryptographic Security Proofs" | Available | TNO | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034010 | Draft - DTR/CYBER-QSC-0022 v0.0.4 "Impact of Quantum Computing on Symmetric Cryptography" | Available | NCSC | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034009 | Draft - DTR/CYBER-QSC-0021 v0.0.10 "Deployment considerations for hybrid schemes" | Available | NCSC | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034008 | ISO/IEC JTC 1/SC 27/WG 2 Liaison statement to ETSI TC Cyber QSC | Available | ETSI | LSin |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034007 | Draft - DTR/CYBER-QSC-0024 v0.0.4 (TR 104 016 ) "A Repeatable Framework for Quantum-safe Migrations" | Reserved | ETSI | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034006 | Draft - DTR/CYBER-QSC-0024 v0.0.4 (TR 104 016 ) "A Repeatable Framework for Quantum-safe Migrations" | Available | ETSI | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034005r2 | Draft of WI 0023v007 Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies | Available | Cosmian | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034005r1 | Draft of WI 0023v007 Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies | Revised | Cosmian | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034005 | Draft of WI 0023v007 Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies | Revised | Cosmian | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034004 | LS from ISG PDL | Available | ETSI | LSin |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034003 | CYBERQSC#34 Meeting Invitation | Available | ETSI | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034002 | GSMA LS in response to QSC on Cryptographic protocol inventory | Available | ETSI | LSin |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034001r2 | Meeting Agenda | Available | Amazon Web Services | Agenda |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034001r1 | Meeting Agenda | Revised | Amazon Web Services | Agenda |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)034001 | Meeting Agenda | Revised | Amazon Web Services | Agenda |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033015 | ETSI TC CYBERQSC #33: Meeting Report | Available | THALES | Report |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033014 | Current ITU-T SG17 meeting quantum related documents | Available | CIS | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033013 | Draft - DMI/CYBER-QSC-0010 v0.0.24 | Available | ISARA | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033012 | Presentation - Costing Grover's Algorithm for AES | Available | NCSC | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033011 | Draft - RTS/CYBER-QSC-0019 v1.1.9 (TS 103 744 ) "Quantum-Safe Hybrid Key Exchanges" | Available | Amazon Web Services | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033010r2 | Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies | Available | Cosmian | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033010r1 | Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies | Revised | Cosmian | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033010 | Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies | Revised | Cosmian | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033009 | Draft - DTR/CYBER-QSC-0022 v0.0.3 "Impact of Quantum Computing on Symmetric Cryptography" | Available | NCSC | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033008 | Draft - DTR/CYBER-QSC-0024 v0.0.3 "A Repeatable Framework for Quantum-safe Migrations" | Available | ISARA | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033007 | LS from GSMA PQTN on guidelines for telecom | Available | ETSI | LSin |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033006 | Draft - DTR/CYBER-QSC-0021 v0.0.9 "Deployment considerations for hybrid schemes" | Available | NCSC | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033005r1 | Cryptographic Inventory | Available | SandboxAQ | NWI |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033005 | Cryptographic Inventory | Revised | SandboxAQ | NWI |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033004 | Draft - DTR/CYBER-QSC-0021 v0.0.8 with revision marks | Available | NCSC | Other |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033003 | Draft - DTR/CYBER-QSC-0021 v0.0.8 "Deployment considerations for hybrid schemes" | Available | NCSC | Draft |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033002r1 | Meeting Agenda | Accepted | Amazon Web Services | Agenda |
| ![View Contribution Details](Img/ViewDetails.png) ![](Img/blank.gif) ![](Img/blank.gif) ![](Img/blank.gif) | CYBERQSC(24)033002 | Meeting Agenda | Revised | Amazon Web Services | Agenda |