Cryptographer Derek Zimmer at Private Internet Access' blog has a three-part series on the National Institute for Standards and Technology (NIST) and its second round of review for candidate algorithms for post-quantum cryptography. After a general audience introduction to what post-quantum cryptography is, he writes about the selection process used by NIST to eventually settle on a pair of algoritms. After several rounds, there will be only two algorithms selected. One will be for asymmetric public-key encryption, and the other will be for digital signatures. Parts 2 and 3 of his posts summarize each candidate algorithm individually.
NIST Round 2 and Post-Quantum Cryptography (part 1) [privateinternetaccess.com]
NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2) [privateinternetaccess.com]
NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3) [privateinternetaccess.com]