Advances in Post-Quantum Cryptography

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: 10 June 2026 | Viewed by 1784

Special Issue Editors

Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Interests: post-quantum cryptography; fully homomorphic encryption; physical layer cryptography

E-Mail Website
Guest Editor
School of Cyber Engineering, Xidian University, Xi'an 710126, China
Interests: applied cryptography; privacy-enhanced technique; cloud data security

Special Issue Information

Dear Colleagues,

Quantum computation is currently one the most biggest threat to cryptography. Theoretically, the security of modern cryptography is built on computational complexity theory, while quantum computation has changed the edge and structure of the computational complexity map and thus brings a transformative threat to the cryptography field. To prepare for the threat of quantum computing, many countries and international standard organizations have initiated the standardization and migration of post-quantum cryptography. To promote the development of post-quantum cryptography, we are organizing this Special Issue. Topics of interest include, but not limited to, the foundational theory of quantum secure cryptography; design and analysis of post-quantum cryptography schemes; implementation of post-quantum cryptography  based on CPU, FPGA, GPU, ASIC, ARM, and RISC-V; security proof in the quantum random oracle model; design and analysis of quantum circuit for cryptography; migration of secure protocols; and applications of post-quantum cryptography in financial systems, mobile communication, power systems, intelligent transportation systems, and blockchain.

Dr. Xianhui Lu
Prof. Dr. Jianfeng Wang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • post-quantum cryptography
  • privacy
  • authentication
  • access control
  • intrusion detection
  • cloud system
  • blockchain
  • machine learning
  • deep learning

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Review

24 pages, 455 KB  
Review
Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions
by Sang-Yoon Chang and Qaiser Khan
Cryptography 2026, 10(1), 12; https://doi.org/10.3390/cryptography10010012 - 12 Feb 2026
Viewed by 956
Abstract
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing. This paper reviews the PQC research landscape and identifies open challenges and future directions for the critical transition to PQC in digital [...] Read more.
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing. This paper reviews the PQC research landscape and identifies open challenges and future directions for the critical transition to PQC in digital networking systems. Building on the NIST standardization process which has hardened the PQC cipher algorithm security, this paper analyzes and describes the recent research on PQC implementations and integrations into scalable and standardized networking systems (Internet, web and cellular networks). We review research on the security, side-channel threats, performances, overheads, and compatibility of PQC ciphers. We also study the research incorporating PQC into the standardized web and cellular networking protocols, ranging from testing the PQC feasibility to proposing protocol solutions and mechanisms to enable PQC. Our study highlights the PQC challenge of large parameter sizes, common across the PQC cipher algorithms, and the research proposing protocol- and system-level mechanisms to address them. Informed by the survey, this paper identifies and highlights the research gaps and future directions to facilitate further research and development for PQC and to secure next-generation digital networking systems. Full article
(This article belongs to the Special Issue Advances in Post-Quantum Cryptography)
Show Figures

Figure 1

25 pages, 1156 KB  
Review
Post-Quantum PKI: A Survey of Applications and Benchmarking Practices
by Maya Thabet, Antonia Tsili, Konstantinos Krilakis and Dimitris Syvridis
Cryptography 2026, 10(1), 11; https://doi.org/10.3390/cryptography10010011 - 12 Feb 2026
Viewed by 441
Abstract
Post-quantum cryptography (PQC) is, and should be, currently dominating the field of cybersecurity, with many works designing and evaluating the transition of communications security to quantum-safe solutions. As the security level and implementations of post-quantum algorithms become more mature, the research on their [...] Read more.
Post-quantum cryptography (PQC) is, and should be, currently dominating the field of cybersecurity, with many works designing and evaluating the transition of communications security to quantum-safe solutions. As the security level and implementations of post-quantum algorithms become more mature, the research on their application to realistic conditions changes accordingly, especially their application to widely adopted network architectures and corresponding protocols such as the Public Key Infrastructure (PKI). In this survey, we identified articles presenting ways of integrating PQC algorithms to PKI and classified related work according to the employed methods and benchmarking choices. The main results from many evaluations converge to similar conclusions on the performance of the most popular PC digital signature algorithms; however, modeling choices concerning architecture variants, hardware and measurement metrics vary. The diversity of the results and experimental setups makes comparison difficult and arrival at an objective conclusion regarding PKI requirements almost impossible. Ultimately, this review reveals a fragmented landscape of benchmarking practices for post-quantum PKI systems. The absence of standardized evaluation frameworks and common test environments limits the comparability and reproducibility of the findings. We aim to provide reference implementations, which are essential to guide the transition of PKI infrastructures toward robust, scalable, and quantum-resistant deployments. Full article
(This article belongs to the Special Issue Advances in Post-Quantum Cryptography)
Show Figures

Graphical abstract

Back to TopTop