Skip to Content

265 Results Found

  • Article
  • Open Access
14 Citations
11,636 Views
33 Pages

A Mathematical Perspective on Post-Quantum Cryptography

  • Maximilian Richter,
  • Magdalena Bertram,
  • Jasper Seidensticker and
  • Alexander Tschache

25 July 2022

In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography. This study presents a detailed, mathematically oriente...

  • Review
  • Open Access
59 Citations
14,893 Views
30 Pages

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

  • Chithralekha Balamurugan,
  • Kalpana Singh,
  • Ganeshvani Ganesan and
  • Muttukrishnan Rajarajan

Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on mo...

  • Article
  • Open Access
24 Citations
8,853 Views
24 Pages

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms

  • Sana Farooq,
  • Ayesha Altaf,
  • Faiza Iqbal,
  • Ernesto Bautista Thompson,
  • Debora Libertad Ramírez Vargas,
  • Isabel de la Torre Díez and
  • Imran Ashraf

6 June 2023

Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will n...

  • Article
  • Open Access
4 Citations
3,833 Views
34 Pages

A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication

  • Babatunde Ojetunde,
  • Takuya Kurihara,
  • Kazuto Yano,
  • Toshikazu Sakano and
  • Hiroyuki Yokoyama

10 June 2025

Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives. However, it is impossible to fully understand the impact that migrating to current Post-Quantum...

  • Article
  • Open Access
117 Citations
33,955 Views
18 Pages

A Survey of Post-Quantum Cryptography: Start of a New Race

  • Duc-Thuan Dam,
  • Thai-Ha Tran,
  • Van-Phuc Hoang,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computer...

  • Article
  • Open Access
1,673 Views
8 Pages

20 February 2025

The development of quantum computers presents a great challenge for current cryptographic algorithms. Post-quantum cryptography has been proposed to secure against quantum computers in the near future. Modular polynomial multiplication is a frequent...

  • Article
  • Open Access
18 Citations
9,397 Views
28 Pages

Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography

  • Maria E. Sabani,
  • Ilias K. Savvas and
  • Georgia Garani

13 April 2024

The swift advancement of quantum computing devices holds the potential to create robust machines that can tackle an extensive array of issues beyond the scope of conventional computers. Consequently, quantum computing machines create new risks at a v...

  • Article
  • Open Access
31 Citations
10,300 Views
15 Pages

Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature

  • Filip Opiłka,
  • Marcin Niemiec,
  • Maria Gagliardi and
  • Michail Alexandros Kourtis

7 June 2024

In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent. This paper presents a comprehensive analysis of the performa...

  • Review
  • Open Access
27 Citations
24,241 Views
23 Pages

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

  • Kanza Cherkaoui Dekkaki,
  • Igor Tasic and
  • Maria-Dolores Cano

As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC). This paper presents a comprehens...

  • Article
  • Open Access
5 Citations
4,490 Views
15 Pages

Research on Development Progress and Test Evaluation of Post-Quantum Cryptography

  • Meng Zhang,
  • Jing Wang,
  • Junsen Lai,
  • Mingfu Dong,
  • Zhenzhong Zhu,
  • Ryan Ma and
  • Jun Yang

18 February 2025

With the rapid development of quantum computing technology, traditional cryptographic systems are facing unprecedented challenges. Post-Quantum Cryptography (PQC), as a new cryptographic technology that can resist attacks from quantum computers, has...

  • Article
  • Open Access
25 Citations
9,440 Views
17 Pages

Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (...

  • Article
  • Open Access
57 Citations
8,856 Views
20 Pages

Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)

  • Jongmin Ahn,
  • Hee-Yong Kwon,
  • Bohyun Ahn,
  • Kyuchan Park,
  • Taesic Kim,
  • Mun-Kyu Lee,
  • Jinsan Kim and
  • Jaehak Chung

19 January 2022

Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems. Since the new quantum era is coming soon in 5–10 years, it is crucial to prepare and de...

  • Article
  • Open Access
12 Citations
3,782 Views
21 Pages

A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications

  • Vinícius Lagrota Rodrigues da Costa,
  • Julio López and
  • Moisés Vidal Ribeiro

23 September 2022

The security of Smart Meter (SM) systems will be a challenge in the era of quantum computing because a quantum computer might exploit characteristics of well-established cryptographic schemes to reach a successful security breach. From a practical pe...

  • Review
  • Open Access
956 Views
24 Pages

Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing. This paper reviews the PQC research landscape and identifies open...

  • Article
  • Open Access
19 Citations
6,301 Views
17 Pages

The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT h...

  • Article
  • Open Access
3,417 Views
23 Pages

24 December 2025

The emergence of quantum computing threatens the security of classical cryptographic algorithms such as RSA and ECC. Post-quantum cryptography (PQC) offers mathematically secure alternatives, but migration is a complex, multi-year undertaking. Unlike...

  • Article
  • Open Access
1,205 Views
30 Pages

As quantum computing continues to advance, it threatens the long-term protection of traditional cryptographic methods, especially in biometric authentication systems where it is important to protect sensitive data. To overcome this challenge, we pres...

  • Article
  • Open Access
16 Citations
13,214 Views
27 Pages

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

  • Maryam Abbasi,
  • Filipe Cardoso,
  • Paulo Váz,
  • José Silva and
  • Pedro Martins

The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). Thi...

  • Article
  • Open Access
859 Views
22 Pages

12 November 2025

The rapid expansion of satellite networks for advanced communication and space exploration has ensured that robust cybersecurity for inter-satellite links has become a critical challenge. Traditional security models rely on centralized trust authorit...

  • Article
  • Open Access
1 Citations
1,610 Views
19 Pages

13 December 2024

Aiming at the problem of energy-efficient design of polynomial coefficient generation algorithms and reconfigurable units in lattice-based post-quantum cryptography, this paper investigates and implements an efficient coefficient generation accelerat...

  • Article
  • Open Access
721 Views
14 Pages

Accelerating Post-Quantum Cryptography: A High-Efficiency NTT for ML-KEM on RISC-V

  • Duc-Thuan Dam,
  • Khai-Duy Nguyen,
  • Duc-Hung Le and
  • Cong-Kha Pham

24 December 2025

Post-quantum cryptography (PQC) is rapidly being standardized, with key primitives such as Key Encapsulation Mechanisms (KEMs) and Digital Signature Algorithms (DSAs) moving into practical applications. While initial research focused on pure software...

  • Article
  • Open Access
3 Citations
5,379 Views
22 Pages

Wireless and Fiber-Based Post-Quantum-Cryptography-Secured IPsec Tunnel

  • Daniel Christian Lawo,
  • Rana Abu Bakar,
  • Abraham Cano Aguilera,
  • Filippo Cugini,
  • José Luis Imaña,
  • Idelfonso Tafur Monroy and
  • Juan Jose Vegas Olmos

21 August 2024

In the near future, commercially accessible quantum computers are anticipated to revolutionize the world as we know it. These advanced machines are predicted to render traditional cryptographic security measures, deeply ingrained in contemporary comm...

  • Article
  • Open Access
8 Citations
5,159 Views
19 Pages

25 November 2023

The advancement of quantum computing threatens the security of conventional public-key cryptosystems. Post-quantum cryptography (PQC) was introduced to ensure data confidentiality in communication channels, and various algorithms are being developed....

  • Article
  • Open Access
1 Citations
6,851 Views
16 Pages

Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing sy...

  • Article
  • Open Access
264 Views
24 Pages

25 February 2026

Large organizations face a critical systems integration challenge when executing multiple concurrent security modernization programs. This paper examines the U.S. Department of Defense’s simultaneous implementation of three transformational ini...

  • Article
  • Open Access
2 Citations
3,552 Views
28 Pages

In an age of AI-generated content and deepfakes, fake news and disinformation are increasingly spread using manipulated or fabricated images. To address this challenge, we introduce Post-Quantum VerITAS, a cryptographic framework for verifying the au...

  • Article
  • Open Access
2,013 Views
25 Pages

An Internet Messenger Using Post-Quantum Cryptography Algorithms Based on Isogenies of Elliptic Curves

  • Beniamin Jankowski,
  • Kamil Szydłowski,
  • Marcin Niemiec and
  • Piotr Chołda

This paper presents the design and implementation of an Internet-based instant messaging application that leverages post-quantum cryptographic algorithms founded on isogenies of elliptic curves. The system employs the CSIDH cryptosystem for key excha...

  • Article
  • Open Access
6 Citations
4,027 Views
24 Pages

The security of the digital certificates used in authenticating network devices relies on cryptographic algorithms like the RSA and ECC, which are vulnerable to quantum attacks. This study addresses the urgent need to secure the Simple Certificate En...

  • Article
  • Open Access
3 Citations
2,517 Views
19 Pages

29 May 2025

To address the growing threat of quantum computing to classical cryptographic primitives, this study introduces NTRU-MCF, a novel lattice-based signature scheme that integrates multidimensional lattice structures with fractional-order chaotic systems...

  • Proceeding Paper
  • Open Access
2 Citations
3,734 Views
7 Pages

Lightweight Post-Quantum Cryptography: Applications and Countermeasures in Internet of Things, Blockchain, and E-Learning

  • Chin-Ling Chen,
  • Kuang-Wei Zeng,
  • Wei-Ying Li,
  • Chin-Feng Lee,
  • Ling-Chun Liu and
  • Yong-Yuan Deng

12 August 2025

With the rapid advancement of quantum computing technology, traditional encryption methods are encountering unprecedented challenges in the Internet of Things (IoT), blockchain systems, and digital learning (e-learning) platforms. Therefore, we syste...

  • Article
  • Open Access
11 Citations
5,657 Views
16 Pages

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

  • Hyunjun Kim,
  • Wonwoong Kim,
  • Yeajun Kang,
  • Hyunji Kim and
  • Hwajeong Seo

18 September 2024

The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a ser...

  • Proceeding Paper
  • Open Access
2 Citations
2,784 Views
5 Pages

Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital s...

  • Article
  • Open Access
1 Citations
1,506 Views
23 Pages

HySecure: FPGA-Based Hybrid Post-Quantum and Classical Cryptography Platform for End-to-End IoT Security

  • Bohao Zhang,
  • Jinfa Hong,
  • Gaoyu Mao,
  • Shiyu Shen,
  • Hao Yang,
  • Guangyan Li,
  • Shengzhe Lyu,
  • Patrick S. Y. Hung and
  • Ray C. C. Cheung

30 September 2025

As the Internet of Things (IoT) continues to expand into mission-critical and long-lived applications, securing low-power wide-area networks (LPWANs) such as Narrowband IoT (NB-IoT) against both classical and quantum threats becomes imperative. Exist...

  • Review
  • Open Access
55 Citations
13,936 Views
26 Pages

Post-Quantum Security: Opportunities and Challenges

  • Silong Li,
  • Yuxiang Chen,
  • Lin Chen,
  • Jing Liao,
  • Chanchan Kuang,
  • Kuanching Li,
  • Wei Liang and
  • Naixue Xiong

26 October 2023

Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everyt...

  • Article
  • Open Access
7 Citations
7,631 Views
34 Pages

19 November 2024

With the rapid growth of connected vehicles and the vulnerability of embedded systems against cyber attacks in an era where quantum computers are becoming a reality, post-quantum cryptography (PQC) is a crucial solution. Yet, by nature, automotive se...

  • Review
  • Open Access
6 Citations
8,016 Views
26 Pages

Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey

  • Jingyu Chen,
  • Haitao Deng,
  • Huachang Su,
  • Minghao Yuan and
  • Yongjun Ren

As the most popular cryptographic scheme in the post-quantum field, lattices have received extensive attention and research. Not only do they provide quantum-resistant security, they also enable the construction of complex applications. Currently, la...

  • Article
  • Open Access
2 Citations
5,084 Views
31 Pages

R-LWE-Based Distributed Key Generation and Threshold Decryption

  • Ferran Alborch,
  • Ramiro Martínez and
  • Paz Morillo

25 February 2022

Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography. The most prominent field in post-quantum cryptography is lattice-...

  • Article
  • Open Access
9 Citations
9,387 Views
21 Pages

On the Performance and Security of Multiplication in GF(2N)

  • Jean-Luc Danger,
  • Youssef El Housni,
  • Adrien Facon,
  • Cheikh T. Gueye,
  • Sylvain Guilley,
  • Sylvie Herbel,
  • Ousmane Ndiaye,
  • Edoardo Persichetti and
  • Alexander Schaub

Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ). In this paper, we present a set of optimizations applied to DAGS...

  • Review
  • Open Access
7 Citations
6,527 Views
39 Pages

Review of Chosen Isogeny-Based Cryptographic Schemes

  • Bartosz Drzazga and
  • Łukasz Krzywiecki

Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can brea...

  • Article
  • Open Access
5 Citations
4,490 Views
16 Pages

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

  • Gyeongju Song,
  • Kyungbae Jang,
  • Siwoo Eum,
  • Minjoo Sim and
  • Hwajeong Seo

16 September 2023

The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC stand...

  • Article
  • Open Access
1,495 Views
15 Pages

A New Hard Problem for Post-Quantum Cryptography: Q-Problem Primitives

  • Mostefa Kara,
  • Mohammad Hammoudeh and
  • Sultan Alamri

26 July 2025

This article investigates the Q-Problem, a novel theoretical framework for post-quantum cryptography. It aims to redefine cryptographic hardness by moving away from problems with unique solutions toward problems that admit multiple indistinguishable...

  • Article
  • Open Access
22 Citations
5,856 Views
25 Pages

This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD). Modern cryptography faces significant threats from quantum computers, which ca...

  • Article
  • Open Access
9 Citations
3,399 Views
15 Pages

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

  • Yajing Chang,
  • Yingjian Yan,
  • Chunsheng Zhu and
  • Pengfei Guo

18 October 2022

The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography. Based on the leakage mechanism in the decapsulation stage of LWE/LWR-based post-quantum crypto...

  • Review
  • Open Access
754 Views
18 Pages

19 February 2026

The nascent quantum computing brings unprecedented threats to the security roots of blockchain technology, potentially compromising cryptographic protocols securing decentralized systems. This review paper discusses the developing quantum threat scen...

  • Article
  • Open Access
8 Citations
4,775 Views
13 Pages

Post-Quantum KEMs for IoT: A Study of Kyber and NTRU

  • M. Awais Ehsan,
  • Walaa Alayed,
  • Amad Ur Rehman,
  • Waqar ul Hassan and
  • Ahmed Zeeshan

5 June 2025

Current improvements in quantum computing present a substantial challenge to classical cryptographic systems, which typically rely on problems that can be solved in polynomial time using quantum algorithms. Consequently, post-quantum cryptography (PQ...

  • Article
  • Open Access
12 Citations
4,236 Views
18 Pages

The advent of quantum computing presents a significant threat to the security of asymmetric cryptographic algorithms, necessitating the adoption of new cryptographic mechanisms resilient to quantum-based attacks. This need is particularly critical fo...

  • Article
  • Open Access
1 Citations
3,949 Views
18 Pages

CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024. The resilience of post-quantum cryptography to side-channel...

  • Article
  • Open Access
1,583 Views
13 Pages

28 October 2025

Post-quantum threshold cryptography requires complete elimination of classical assumptions to achieve genuine quantum resistance. This work presents a fully lattice-based dealerless distributed key generation (DKG) protocol with threshold CRYSTALS&nd...

  • Article
  • Open Access
15 Citations
8,829 Views
25 Pages

Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era

  • Maria E. Sabani,
  • Ilias K. Savvas,
  • Dimitrios Poulakis,
  • Georgia Garani and
  • Georgios C. Makris

The rapid development of quantum computing devices promises powerful machines with the potential to confront a variety of problems that conventional computers cannot. Therefore, quantum computers generate new threats at unprecedented speed and scale...

  • Systematic Review
  • Open Access
2 Citations
2,026 Views
16 Pages

2 December 2025

The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud...

of 6