How to Use This Document

This is the companion source document to Bitcoin’s Race to Quantum Resistance. Sources are organized by topic. Each section corresponds to a section of the main report. Use the table of contents to navigate.


Table of Contents

  1. Formal Proposals (BIPs and BIP-Adjacent)
  2. NIST Post-Quantum Cryptography Standards
  3. Algorithm Technical References
  4. Chaincode Labs: Bitcoin and Quantum Computing Report
  5. Threat Model: Quantum Timeline and Vulnerability Analysis
  6. Project Eleven: Q-Day Prize and Research
  7. The Satoshi Coin Debate
  8. Jameson Lopp: Against Quantum Recovery
  9. QRAMP: Mandatory Migration Proposal
  10. CoinShares: Quantum Risk Assessment
  11. Bitcoin Developer Mailing List Threads
  12. Market Response and Ecosystem Coverage
  13. Implementation and Tooling

Formal Proposals (BIPs and BIP-Adjacent) {#formal-proposals}

BIP-360: Pay-to-Merkle-Root (P2MR) — Official

The proposal itself, merged into the official Bitcoin BIP repository on February 11, 2026.

Context: Originally titled “Pay-to-Quantum-Resistant-Hash” (P2QRH), the proposal was first posted to Delving Bitcoin by Hunter Beast on June 8, 2024. It underwent 11 major versions before stabilization. The critical pivot in v0.8.0 (July 2025) stripped all PQ signature algorithms out of the output type itself — deferring them to a future companion BIP — and introduced Ethan Heilman as co-author. Isabel Foxen Duke joined as third author.

BIP-360: Historical Branch (P2QRH — Pre-Rename)

Note: The pre-rename versions are useful for understanding how and why the proposal evolved. The v0.6.0 snapshot still includes SQIsign and FALCON before they were dropped.

BIP-Hourglass V2: Rate-Limiting P2PK Spends

What it proposes: Rate-limit spends from P2PK outputs to 1 output per block (~144 BTC/day). At that pace, the ~1.72M BTC P2PK pool would take 32+ years to drain — preventing a catastrophic supply shock if quantum computers arrive while large vulnerable holdings remain. This is intended as a soft, temporary measure, not a permanent freeze.

Lopp-Papathanasiou: Post-Quantum Migration Proposal

Three-phase structure:

  1. Phase A (3 years post-BIP-360): Ban sending to vulnerable address types
  2. Phase B (5 years post-BIP-360): All legacy ECDSA/Schnorr spends become invalid
  3. Phase C (Optional): ZK proof-of-seed recovery mechanism

Limitation: Phase C recovery is only compatible with BIP-39 seed phrases, which postdate Satoshi-era P2PK outputs. Satoshi’s coins and other pre-2013 holdings could not use this mechanism.

QRAMP: Quantum-Resistant Address Migration Protocol {#qramp}

Authored by: Agustin Cruz

What it proposes: A mandatory hard deadline after which all legacy ECDSA/Schnorr spends become permanently invalid. The hardest-line proposal in the debate — requires a hard fork or extremely aggressive soft fork and broad consensus that has not materialized. Covered extensively in discussions about its potential to cause a chain split.


NIST Post-Quantum Cryptography Standards {#nist-standards}

The Three Finalized Standards (August 2024)

The three standards finalized August 13, 2024:

StandardSchemeBasisBitcoin Relevance
FIPS 203ML-KEM (Kyber)LatticeKey encapsulation only, not relevant for signing
FIPS 204ML-DSA (Dilithium)MLWE LatticePrimary signing candidate for Bitcoin
FIPS 205SLH-DSA (SPHINCS+)Hash functionsConservative signing alternative

A fourth standard, FIPS 206 (FN-DSA / FALCON), followed after initial publication.

In-Depth Technical Analysis: Cloudflare

Well-written technical overview of ML-KEM, ML-DSA, and SLH-DSA with concrete implementation guidance. Cloudflare was among the earliest large-scale deployers of post-quantum cryptography in TLS.

Overview: PostQuantum.com


Algorithm Technical References {#algorithm-references}

ML-DSA (CRYSTALS-Dilithium) Implementation Details

Covers key sizes (ML-DSA-44: 1,312B public key, 2,420B signature), parameter sets, and comparative analysis against FALCON and SPHINCS+.

SLH-DSA (SPHINCS+) — Hash-Based Cryptography

Good conceptual overview of why hash-based signatures are considered the most conservative post-quantum option. Security reduces to hash function collision resistance — the same assumption Bitcoin already makes for proof-of-work.

FN-DSA (FALCON) — What Made It Attractive and Why It Was Dropped

Algorand has deployed FALCON in production. This brief explains the technical advantages (compact signatures, potential for aggregation) and the implementation challenges (constant-time floating-point arithmetic, side-channel risks). Provides comparison of FALCON-512 vs FALCON-1024 parameter sets.

Signature Size Visualization Tool

Interactive tool for comparing signature and public key sizes across all major post-quantum schemes. Useful for developing intuition about the scale of the size problem.

Hash-Based Signatures for Bitcoin — Developer Discussion

“Hash-Based Signatures for Bitcoin’s Post-Quantum Future” — an early and influential thread arguing for prioritizing SLH-DSA (hash-based) over lattice schemes for Bitcoin. Captures the core argument: Bitcoin should minimize novel cryptographic assumptions and anchor to the same primitives it already trusts.

Hybrid Post-Quantum Signatures Research

“Hybrid Post-Quantum Signatures for Bitcoin and Ethereum: A Protocol-Level Integration Strategy” — academic paper examining the tradeoffs of requiring both classical and PQ signatures during a transition period. Covers overhead analysis and activation sequence design.


Chaincode Labs: Bitcoin and Quantum Computing Report {#chaincode-labs-report}

This is the most technically comprehensive public document on the topic. Chaincode Labs is one of Bitcoin’s most respected research organizations (home to developers including Pieter Wuille’s former work, Suhas Daftuar, etc.). The report covers:

  • Detailed quantum hardware timeline analysis (IBM, Google, IonQ roadmaps)
  • Qubit requirements for breaking secp256k1 (citing Dallaire-Demers et al.)
  • Comprehensive algorithm comparison with concrete size tables
  • The dual-track framework (2-year contingency vs 7-year comprehensive)
  • Lifeboat scheme designs (commit-delay-reveal)
  • Fee and UTXO set impact modeling
  • Ecosystem coordination requirements

The report’s key framing: Bitcoin faces two distinct threats — “long-exposure attacks” on already-exposed public keys (P2PK), and “short-exposure attacks” on public keys revealed during spending. Each requires different countermeasures.


Threat Model: Quantum Timeline and Vulnerability Analysis {#threat-model}

Quantum Vulnerability of Bitcoin Addresses

Detailed breakdown of how many BTC are in which address types, with vulnerability classification. Concludes ~6–7 million BTC have exposed public keys at varying levels of risk.

Technical Reality Check on Timelines

Good overview-level piece: walks through the qubit requirements, current hardware vs. requirements gap, and why 2030–2035 is the credible concern window rather than the present.

Quantum Risks to Cryptocurrencies

Covers Bitcoin, Ethereum, and other blockchain systems. Provides comparative context: Ethereum is in some ways more exposed (more P2PK-equivalent usage patterns) and less organizationally prepared.

Grover’s Algorithm and SHA-256 Mining

  • The threat to SHA-256 is covered in the Chaincode report and Simple Mining piece above. The key conclusion: Grover provides only quadratic speedup, and a quantum miner with optimistic specs would achieve ~13.8 GH/s vs. modern ASICs running at hundreds of TH/s — over 1,000× slower. SHA-256 mining is effectively quantum-safe at current scales.

Post-Quantum Blockchain Readiness (Broader Context)

Covers multiple blockchain ecosystems. Bitcoin section covers the same ground as primary sources; the broader context is useful for understanding where Bitcoin sits relative to other chains.


Project Eleven: Q-Day Prize and Research {#project-eleven}

Background: Project Eleven is a quantum computing research organization focused on Bitcoin’s vulnerability. They launched the Q-Day Prize in April 2025: a 1 BTC bounty for breaking the largest ECC key using Shor’s algorithm on actual quantum hardware, with a deadline of April 5, 2026. The prize is designed to benchmark real quantum hardware capability — not to threaten Bitcoin, but to establish a concrete empirical datapoint on the current gap between threat and reality.

Their $6M funding round in June 2025 was notable for a research org in this niche, signaling institutional interest in the question.


The Satoshi Coin Debate {#satoshi-coins}

The Numbers: How Much Is at Stake

The headline figure: 7 million BTC ($440 billion at time of writing) threatened, including Satoshi’s ~1 million BTC. In-depth treatment of the freeze debate and community positions.

Coverage of the Lopp-Papathanasiou proposal’s public release. Includes reactions from across the developer spectrum.

On-chain analysis of Satoshi-era outputs, their address types, and what quantum recovery might mean for price and supply dynamics.

Hard Fork Risk

The most direct treatment of the chain split scenario. Surveys developer positions and community sentiment. The article’s core finding: there is no freeze proposal with sufficient consensus to avoid a fork if forced through.

Burning Coins to Prevent Quantum Theft

Coverage of the most aggressive proposal — destroying vulnerable coins rather than freezing or rate-limiting them. Represents one end of the option space.


Jameson Lopp: Against Quantum Recovery {#lopp-essay}

Published: March 2025. This is the definitive statement of the “freeze/burn” position by one of Bitcoin’s most prominent technical commentators. Key arguments:

  1. Quantum recovery is not “found money” — it is theft at scale, transferring wealth from all holders to quantum-capable actors
  2. Nation-states and FAANG-scale companies will be first to achieve CRQC capability; allowing quantum recovery means transferring ~$440B to the most powerful entities in the world
  3. The immutability argument works both ways: Bitcoin’s social contract has always included that cryptographically broken coins can be handled by network consensus
  4. The “harvest now, decrypt later” threat is already operating — every day of inaction increases the stored attack surface

Worth reading in full. The essay is unusually precise about the practical mechanics of what quantum recovery would look like at the supply level.


CoinShares: Quantum Risk Assessment {#coinshares-report}

CoinShares is one of the largest digital asset management firms in Europe. Their report takes a deliberately measured tone against what they characterize as “quantum hysteria” — arguing that:

  • The hardware gap remains enormous and the timeline is genuinely uncertain
  • Bitcoin’s developer community has demonstrated the ability to coordinate complex protocol changes
  • Premature action carries its own risks (introducing bugs, fragmenting the ecosystem)
  • The risk is “manageable” given appropriate preparation time

This represents the institutional “calm down, but plan carefully” position, in contrast to the more urgent framing from Project Eleven and Lopp.


Bitcoin Developer Mailing List Threads {#developer-mailing-list}

All threads are on the Bitcoindev Google Group.

BIP-360 Status Updates

QRAMP Discussion

Note on using these threads: Bitcoin’s developer mailing list is the primary venue for technical BIP discussion. Positions expressed here carry more weight than media coverage. Pieter Wuille’s blunt statement about confiscation and other technical consensus signals appear in these threads before appearing in press coverage.


Market Response and Ecosystem Coverage {#market-and-ecosystem}

BIP-360 Merged to Official Repository

Coverage of the February 11, 2026 merge. Note: several outlets overstated the significance — merge into the BIPs repo is a documentation milestone, not a protocol activation.

BIP-360 Explained for General Audiences

Taproot Adoption Decline

The drop in Taproot usage (from 54% to 22% of market share by early 2026) is tracked by on-chain analytics platforms. The connection to quantum concerns is noted in AMBCrypto’s coverage:

Quantum Bitcoin Summit

The Summit (2025) brought together developers, researchers, and institutional participants. The dual-track framework (2-year contingency, 7-year comprehensive) emerged from this event as the primary organizational schema for the migration effort.

How to Protect Your Bitcoin Now

Covers the practical steps available to ordinary users today: move to fresh P2WPKH addresses (avoid address reuse), monitor BIP-360 status, avoid Taproot key-path spends until P2MR activation. Not a substitute for the technical reading but useful for the “what should I actually do” question.

Bitcoin’s Proposed Quantum-Resistant Migration Plan

Good overview synthesis of the multiple proposals (BIP-360, QRAMP, Hourglass, Lopp-Papathanasiou) with comparative analysis of tradeoffs.

New Bitcoin Improvement Proposal — Bitcoin Magazine

Early coverage from when the proposal was first introduced in mid-2024. Useful for historical context on how the conversation started.


Implementation and Tooling {#implementation}

libbitcoinpqc — Reference Implementation

Title: Post-Quantum Cryptography for use with Bitcoin according to BIP-360
Maintained by: Hunter Beast (cryptoquick)

This is the reference library accompanying BIP-360. Currently implements ML-DSA-44 (CRYSTALS-Dilithium) with the signing interface designed for Bitcoin’s witness structure. This is where future OP_CHECKMLSIG development will be prototyped.

Status: Functional but not production-ready. Serves as proof-of-concept for the companion BIP’s algorithm selection.

Signet Testing

The first P2MR transaction was executed on Bitcoin’s signet testnet on September 10, 2025. Signet is a controlled test network that allows proposal authors to demonstrate functionality without mainnet risk. Testnet and signet work typically precedes activation proposals by months to years.


← Back to the main report: Bitcoin’s Race to Quantum Resistance