Quantum computing is rapidly advancing and threatens the cryptographic systems that secure digital communications. Classical cryptosystems, such as RSA and ECC, rely on mathematical problems that are difficult for classical computers but can be solved easily by quantum algorithms, such as Shor’s. This challenge underscores the pressing need for Post-Quantum Cryptography (PQC) to safeguard data against both classical and quantum threats. This study provides a comprehensive review of PQC Approaches in securing data against quantum threats by analyzing reviewed journals, conference proceedings, book chapters, and websites. Several researchers reviewed relevant literature published between 2019 and 2026 using the ACM Digital Library, Wiley Online Library, Taylor & Francis, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, and Google Scholar. The review evaluates lattice-based, code-based, Hash-based, multivariate, and isogeny-based schemes across security strength, performance, interoperability, and deployment feasibility in heterogeneous environments, including cloud platforms and Internet of Things devices. The findings indicate that lattice-based schemes, particularly CRYSTALS-Kyber and CRYSTALS-Dilithium, currently offer the most balanced trade-off between efficiency and quantum resistance, while Hash-based schemes such as SPHINCS+ prioritize conservative security at notable performance cost. Code-based approaches, including McEliece, demonstrate strong long-term security but remain constrained by large key sizes. The review highlights implementation, energy, migration, and governance barriers that must be addressed before adoption. The review concludes by emphasizing that transitioning to PQC requires a collaborative effort from academia, industry, and government. Future research should focus on integrating lightweight PQC in IoT, 5G/6G, and cloud environments, as well as developing hybrid models that combine classical and quantum-safe systems. Addressing these issues is crucial for establishing secure data protection in the quantum era.
Research Article | Open Access | Download Full Text
Volume 4 | Issue 4 | Year 2025 | Article Id: DST-V4I4P101 DOI: https://doi.org/10.59232/DST-V4I4P101
Securing Data against Quantum Threats: Post-Quantum Cryptography Approaches
Taban Habibu, Francis Xavier Ovoni
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 08 Oct 2025 | 09 Nov 2025 | 12 Dec 2025 | 30 Dec 2025 |
Citation
Taban Habibu, Francis Xavier Ovoni. “Securing Data against Quantum Threats: Post-Quantum Cryptography Approaches.” DS Journal of Digital Science and Technology, vol. 4, no. 4, pp. 1-32, 2025.
Abstract
Keywords
Quantum Computing, Post-Quantum Cryptography, NIST PQC Standards, Quantum-Resistant Algorithms, Data Security.
References
[1] Maryam Abbasi et al., “A Practical Performance Benchmark of Post-Quantum Cryptography across Heterogeneous Computing Environments,” Cryptography, vol. 9, no. 2, pp. 1-27, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Mohammad Abudalou, “Enhancing Data Security through Advanced Cryptographic Techniques,” International Journal of Computer Science and Mobile Computing - IJCSMC, vol. 13, no. 1, pp. 88-92, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] M. AbuGhanem, “IBM Quantum Computers: Evolution, Performance, and Future Directions,” The Journal of Supercomputing, vol. 81, no. 5, pp. 1-29, 2025. [CrossRef] [Google Scholar] [Publisher Link]
[4] Muhammad AbuGhanem, “Superconducting Quantum Computers: Who is Leading the Future?,” EPJ Quantum Technology, vol. 12, no. 1, pp. 1-75, 2025. [CrossRef] [Google Scholar] [Publisher Link]
[5] Temitope Adewale, “Post-Quantum Cryptography Standards: Evaluating Industry Adoption and Implementation Challenges,” 2023.
[Google Scholar]
[6] Nadeem Ahmed, Lei Zhang, and Aryya Gangopadhyay, “A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries,” 2025 IEEE International Conference on Quantum Computing and Engineering (QCE), Albuquerque, NM, USA, pp. 906-917, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Ruma Kareem K. Ajeena, “A Proposed Modification of Diffie-Hellman Key Exchange based on Integer Matrices,” International Journal of Mathematics and Computer Science, vol. 19, no. 1, 211-218, 2024.
[Google Scholar] [Publisher Link]
[8] Babatunde Akande, “The Impact of Quantum Computing on Encryption: How Quantum Computers can Break Current Encryption Methods, such as RSA and ECC, and What this Means for Data Security,” 2025.
[Google Scholar]
[9] Samya Al Busafi, and Basant Kumar, “Review and Analysis of Cryptography Techniques,” 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, pp. 323-327, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Gorjan Alagic et al., “Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process,” NIST Internal Report: NIST IR 8545, pp. 1-27, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Gorjan Alagic et al., “Status Report on the First Round of the Additional Digital Signature Schemes for the NIST Post-Quantum Cryptography Standardization Process,” National Institute of Standards and Technology, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Abdullah Saad Alessa, Mohammad Hammoudeh, and Harbaksh Singh, A Peek into the Post-Quantum Era-PQA PQC: What will Happen in 2030, 1st ed., Quantum Technology Applications, Impact, and Future Challenges, pp. 163-180, CRC Press, 2025.
[Google Scholar] [Publisher Link]
[13] Nick Aquina et al., “A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography,” EPJ Quantum Technology, vol. 12, no. 1, pp. 1-42, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Nicolas Aragon et al., “BIKE: Bit Flipping Key Encapsulation, HAL Open Science, 2022.
[Google Scholar] [Publisher Link]
[15] Mohammad Asif, and Sanjay Agal, “A Comprehensive Study on Lattice, Code, and Hash-based Cryptographic Algorithms in Post-Quantum Security with Practical Applications,” IET Conference Proceedings, vol. 2025, no. 7, pp. 1176-1183, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Rama Azhari, and Agita Nisa Salsabila, “Analyzing the Impact of Quantum Computing on Current Encryption Techniques,” IAIC Transactions on Sustainable Digital Innovation (ITSDI), vol. 5, no. 2, pp. 148-157, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Muhammad Talha Tahir Bajwa et al., “Post-Quantum Cryptography for Big Data Security,” The Asian Bulletin of Big Data Management, vol. 5, no. 3, pp. 81-94, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Rajkumar Banoth, and Rekha Regar, Asymmetric Key Cryptography, Classical and Modern Cryptography for Beginners, Springer, Cham, pp. 109-165, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Freddie Barrett-Danes, and Fahad Ahmad, “Quantum Computing and Cybersecurity: A Rigorous Systematic Review of Emerging Threats, Post-Quantum Solutions, and Research Directions (2019–2024),” Discover Applied Sciences, vol. 7, no. 10, pp. 1-20, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Daniel Chicayban Bastos, and Luis Antonio Brasil Kowada, “How to Detect Whether Shor’s Algorithm Succeeds Against Large Integers Without a Quantum Computer,” Procedia Computer Science, vol. 195, pp. 145-151, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Denis Berger, Mouad Lemoudden, and William J. Buchanan, “Post-Quantum Migration of the Tor Application,” Journal of Cybersecurity and Privacy, vol. 5, no. 2, pp. 1-38, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Hilal Ahmad Bhat et al., “Quantum Computing: Fundamentals, Implementations and Applications,” IEEE Open Journal of Nanotechnology, vol. 3, pp. 61-77, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Ekta Bindal, and Abhay Kumar Singh, “Secure and Compact: A new Variant of McEliece Cryptosystem,” IEEE Access, vol. 12, pp. 35586-35596, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Arit Kumar Bishwas, and Mousumi Sen, “Strategic Roadmap for Quantum-Resistant Security: A Framework for Preparing Industries for the Quantum Threat,” arXiv Preprint, pp. 1-30, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Sergey Bravyi et al., “The Future of Quantum Computing with Superconducting Qubits,” Journal of Applied Physics, vol. 132, no. 16, pp. 1-18, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Marco Brohet, Felipe Valencia, and Francesco Regazzoni, “Instruction Set Extensions for Post-Quantum Cryptography,” 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), San Francisco, CA, USA, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Robert Campbell, “Enterprise Migration to Post-Quantum Cryptography: Timeline Analysis and Strategic Frameworks,” Computers, vol. 15, no. 1, pp. 1-23, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Yuan Cao et al., “An Efficient Full Hardware Implementation of Extended Merkle Signature Scheme,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 69, no. 2, pp. 682-693, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Emily R. Carter et al., “Hybrid Cryptographic Models for Quantum and Classical Interoperability,” 2023.
[Google Scholar]
[30] Eunmi Chae, Joonhee Choi, and Junki Kim, “An Elementary Review on Basic Principles and Developments of Qubits for Quantum Computing,” Nano Convergence, vol. 11, no. 1, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Kanza Cherkaoui Dekkaki, Igor Tasic, and Maria-Dolores Cano, “Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process,” Technologies, vol. 12, no. 12, pp. 1-23, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Gaurab Chhetri et al., “Post-Quantum Cryptography and Quantum-Safe Security: A Comprehensive Survey,” arXiv Preprint, pp. 1-33, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Mauricio Cisneros, and Javier Olazabal, “Lattice-based Cryptography in the Quantum Era: A Survey,” Interfases, vol. 18, pp. 281-299, 2023.
[Google Scholar]
[34] Christopher Columbus Chinnappan et al., “Quantum Computing: Foundations, Architecture and Applications,” Engineering Reports, vol. 7, no. 8, pp. 1-27, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Alberto Comin, “Hybrid Quantum Security: Integrating QKD and PQC in Brownfield Optical Networks,” Quantum Information Technologies Journal, pp. 105-122, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Brian Couzens, “Quantum Risk: A Strategic Framework for PQC Migration and Board Accountability,” SSRN, pp. 1-78, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Duc-Thuan Dam et al., “A Survey of Post-Quantum Cryptography: Start of a New Race,” Cryptography, vol. 7, no. 3, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Aisling Dawson, Redefining Public Key Infrastructure (PKI) in the Post-Quantum Era, ABI Research, 2025. [Online]. Available:
[39] Koen de Boer, and Wessel van Woerden, “Lattice-based Cryptography: A Survey on the Security of the Lattice-based NIST Finalists,” Cryptology ePrint Archive, pp. 1-125, 2025.
[Google Scholar] [Publisher Link]
[40] Jiankuo Dong et al., “Eco-Bike: Bridging the Gap between PQC Bike and GPU Acceleration,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 8952-8965, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Victor Dorojan, “A General Introduction to Shor's Algorithm and its Applications,” SSRN, pp. 1-4, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Bartosz Drzazga, and Lukasz Krzywiecki, “Review of Chosen Isogeny-based Cryptographic Schemes,” Cryptography, vol. 6, no. 2, pp. 1-39, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[43] William Chuck Easttom, Quantum Computing Fundamentals, Addison-Wesley Professional, 2021.
[Google Scholar]
[44] Obianuju Egbuagha, and Emmanuel Ikwunna, “Post-Quantum Cryptography in Practice: A Literature Review of Protocol-Level Transitions and Readiness,” Cryptology ePrint Archive, pp. 1-40, 2025.
[Google Scholar] [Publisher Link]
[45] Daniel J. Egger et al., “Quantum Computing for Finance: State-of-the-Art and Future Prospects,” IEEE Transactions on Quantum Engineering, vol. 1, pp. 1-24, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[46] M. Awais Ehsan et al., “Post-Quantum KEMs for IoT: A Study of Kyber and NTRU,” Symmetry, vol. 17, no. 6, pp. 1-13, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Ahmed Hossam Eid, and A.S. Ismail, “An Analytical Review on Lattice-based Cryptography,” Journal of Physics: Conference Series, vol. 3075, no. 1, pp. 1-13, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Zion Elani, “Qubit, Quantum Entanglement and All that: Quantum Computing Made Simple,” American Research Journal of Physics, vol. 7, no. 1, pp. 1-9, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Volkan Erol, “Quantum Readiness in Cryptography: A Maturity-based Framework for Post-Quantum Transition,” pp. 1-27, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[50] Efat Fathalla, and Mohamed Azab, “Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-based Signature Schemes, Security, and Optimizations,” IEEE Access, vol. 12, pp. 175969-175987, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[51] Gregory Fitzgibbon, and Carlo Ottaviani, “Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography,” Cryptography, vol. 8, no. 2, pp. 1-17, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[52] Pierre-Alain Fouque et al., “A Closer Look at Falcon,” Cryptology ePrint Archive, pp. 1-45, 2024.
[Google Scholar] [Publisher Link]
[53] Rahoul Ganesh et al., “A Panoramic Survey of the Advanced Encryption Standard: from Architecture to Security Analysis, Key Management, Real-World Applications, and Post-Quantum Challenges,” International Journal of Information Security, vol. 24, no. 5, pp. 1-45, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Linus Gasser, Post-Quantum Cryptography, Trends in Data Protection and Encryption Technologies, Springer, Cham, pp. 47-52, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[55] Amare Geremew, and Atif Mohammad, “Preparing Critical Infrastructure for Post-Quantum Cryptography: Strategies for Transitioning Ahead of Cryptanalytically Relevant Quantum Computing,” International Journal on Engineering, Science and Technology, vol. 6, no. 4, pp. 338-365, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[56] Hadi Gharavi, Jorge Granjal, and Edmundo Monteiro, “Post-Quantum Blockchain Security for the Internet of Things: Survey and Research Directions,” IEEE Communications Surveys and Tutorials, vol. 26, no. 3, pp. 1748-1774, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[57] Chris Gilbert, and Mercy Abiola Gilbert, “Investigating the Challenges and Solutions in Cybersecurity using Quantum Computing and Cryptography,” International Research Journal of Advanced Engineering and Science, vol. 9, no. 4, pp. 291-315, 2024.
[Google Scholar] [Publisher Link]
[58] Alexandre Augusto Giron, Ricardo Custódio, and Francisco Rodríguez-Henríquez, “Post-Quantum Hybrid Key Exchange: A Systematic Mapping Study,” Journal of Cryptographic Engineering, vol. 13, no. 1, pp. 71-88, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[59] Andrew Glassner, “An Introduction to Quantum Computing,” ACM SIGGRAPH 2024 Courses, pp. 1-65, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[60] Élie Gouzien, and Nicolas Sangouard, “Factoring 2048-Bit RSA Integers in 177 Days with 13 436 Qubits and a Multimode Memory,” Physical Review Letters, vol. 127, no. 14, pp. 1-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[61] Mayank Gupta, and Manisha J. Nene, “Quantum Computing: An Entanglement Measurement,” 2020 IEEE International Conference on Advent Trends in Multidisciplinary Research and Innovation (ICATMRI), Buldhana, India, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[62] Dylan Herman et al., “Quantum Computing for Finance,” Nature Reviews Physics, vol. 5, no. 8, pp. 450-465, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[63] Meng-Leong How, and Sin-Mei Cheah, “Forging the Future: Strategic Approaches to Quantum AI Integration for Industry Transformation,” vol. 5, no. 1, pp. 290-323, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[64] Xiaowen Hu et al., “FPTRU: Optimization of NTRU-Prime and TLS Performance Assessment,” Progress in Cryptology - AFRICACRYPT 2025: 16th International Conference on Cryptology in Africa, Rabat, Morocco, vol. 15651, pp. 216-241, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[65] Yiming Huang et al., “A Pure Hardware Implementation of CRYSTALS-KYBER PQC Algorithm through Resource Reuse,” IEICE Electronics Express, vol. 17, no. 7, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[66] Maksim Iavich, Tamari Kuchukhidze, and Razvan Bocu, “Post-Quantum Digital Signature: Verkle-based HORST,“ Journal of Cybersecurity and Privacy, vol. 5, no. 2, pp. 1-23, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[67] Vipin Jain, “A Review on Different Types of Cryptography Techniques,” ACADEMICIA: An International Multidisciplinary Research Journal, vol. 11, no. 11, pp. 1087-1094, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[68] A. Jenefa et al., “PQC Secure: Strategies for Defending Against Quantum Threats,” 2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS), Pudukkottai, India, pp. 1799-1804, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[69] Michael Nsikan John et al., “Lattices in Quantum-ERA Cryptography,” International Journal of Research Publication and Reviews, vol. 11, no. 4, pp. 2175-2179, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[70] Neha Junagade, Sheetal U. Bhandari, and Rachana Y. Patil, “Comparative Study of Quantum Algorithms: A Comprehensive Analysis,” 2024 8th International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, pp. 1-5, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[71] Francis Kagai et al., “Harvest-Now, Decrypt-Later: A Temporal Cybersecurity Risk in the Quantum Transition,” Telecom, vol. 6, no. 4, pp. 1-23, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[72] Elina Kalnina et al., “Integration of PQC and QKD: Applications, Challenges and Implementation Frameworks,” Applied Cryptography and Network Security Workshops: ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS, Munich, Germany, vol. 15653, pp. 266-284, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[73] Yoshito Kanamori, and Seong-Moo Yoo, “Quantum Computing: Principles and Applications,” Journal of International Technology and Information Management, vol. 29, no. 2, pp. 43-71, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[74] P. Rajesh Kannan et al., “Advancing Post-Quantum Cryptography: A Hybrid Lattice-Hash Approach,” 2025 6th International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India, pp. 423-428, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[75] Bikram Khanal et al., “Supercomputing Leverages Quantum Machine Learning and Grover’s Algorithm,” The Journal of Supercomputing, vol. 79, no. 6, pp. 6918-6940, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[76] Sebastian Kish, Josef Pieprzyk, and Seyit Camtepe, Trends in Quantum Key Distribution (QKD), Quantum Technologies: Trends in Quantum Key Distribution (QKD), Springer, Cham, pp. 119-131, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[77] R. Krishnaprabha, “Masked Torsion Point Supersingular Isogeny Diffie-Hellman: A Technique for Preventing Castryck-Decru Attack Against SIDH,” AIP Conference Proceedings, vol. 3283, no. 1, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[78] Randy Kuang, Maria Perepechaenko, and Michel Barbeau, “A New Quantum-Safe Multivariate Polynomial Public Key Digital Signature Algorithm,” Scientific Reports, vol. 12, no. 1, pp. 1-21, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[79] Mandeep Kumar, and Bhaskar Mondal, “Study on Implementation of Shor’s Factorization Algorithm on Quantum Computer,” SN Computer Science, vol. 5, no. 4, pp. 1-20, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[80] Alvary Kefas Kwala, Shri Kant, and Alpna Mishra, “Comparative Analysis of Lattice-based Cryptographic Schemes for Secure IoT Communications,” Discover Internet of Things, vol. 4, no. 1, pp. 1-14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[81] Younes Lahraoui et al., “Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-based Method for Message Mapping and Integrity Assurance,” Cryptography, vol. 8, no. 2, pp. 1-31, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[82] Atinderpal Singh Lakhan, “A Comparative Study on Post-Quantum Cryptographic Digital Signature Algorithms: Network Performance, Key Robustness, and Energy Consumption,” Doctoral Dissertation, Carleton University, pp. 1-119, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[83] Tran Duc Le et al., “Are Enterprises Ready for Quantum-Safe Cybersecurity?,” arXiv Preprint, pp. 1-29, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[84] Kaitlyn Lee, Michael Gowanlock, and Bertr Cambou, “SABER-GPU: A Response-based Cryptography Algorithm for SABER on the GPU,” 2021 IEEE 26th Pacific Rim International Symposium on Dependable Computing (PRDC), Perth, Australia, pp. 123-132, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[85] Douwei Lei et al., “Faster Implementation of Ideal Lattice-based Cryptography using AVX512,” ACM Transactions on Embedded Computing Systems, vol. 22, no. 5, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[86] Hoon Wei Lim, and John Busell, “Managing Risks and Opportunities for Quantum Safe Development,” NCS. Pte. Ltd and IBM Quantum, Tech. Rep, pp. 1-20, 2024.
[Google Scholar]
[87] Fengxia Liu et al., “A Survey on Lattice-based Digital Signature,” Cybersecurity, vol. 7, no. 1, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[88] Jesus Lopez et al., “Evaluating Post-Quantum Cryptographic Algorithms on Resource-Constrained Devices,” 2025 IEEE International Conference on Quantum Computing and Engineering (QCE), USA, pp. 918-925, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[89] Vadim Lyubashevsky et al., “Crystals-Dilithium,” Algorithm Specifications and Supporting Documentation, 2020.
[Google Scholar]
[90] A. Mahendran, “Design and Simulation of an Energy-Efficient Adaptive Lightweight Post-Quantum Cryptographic Framework for Resource-Constrained IoT Devices,” Research Square, pp. 1-15, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[91] Aayush Mainali, and Sirjan Ghimire, “A Statistical Side-Channel Risk Model for Timing Variability in Lattice-based Post-Quantum Cryptography,” arXiv Preprint, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[92] Surajit Mandal et al., “Implementing Grover’s on AES-based AEAD Schemes,” Scientific Reports, vol. 14, no. 1, pp. 1-18, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[93] Dominik Marchsreiter, and Johanna Sepúlveda, “A PQC and QKD Hybridization for Quantum-Secure Communications,” 2023 26th Euromicro Conference on Digital System Design (DSD), Golem, Albania, pp. 545-552, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[94] Jillian Mascelli, and Megan Rodden, “Harvest Now Decrypt Later”: Examining Post-Quantum Cryptography and the Data Privacy Risks for Distributed Ledger Networks,” SSRN, pp. 1-21, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[95]Catherine C. McGeoch et al., “A Comment on Comparing Optimization on D-Wave and IBM Quantum Processors,” arXiv Preprint, pp. 1-5, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[96] Qurban A. Memon, Mahmoud Al Ahmad, and Michael Pecht, “Quantum Computing: Navigating the Future of Computation, Challenges, and Technological Breakthroughs,” Quantum Reports, vol. 6, no. 4, pp. 627-663, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[97] Sweta Mishra, Bhaskar Mondal, and Rishi Kumar Jha, “A Survey on Isogeny-based Cryptographic Protocols,” Wireless Networks, vol. 31, no. 3, pp. 2993-3024, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[98]Dustin Moody et al., “Transition to Post-Quantum Cryptography Standards,” NIST Internal or Interagency Report (NISTIR) 8547 (Draft). National Institute of Standards and Technology, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[99] Nicolas Moura et al., “Assessment of Lightweight Cryptography Algorithms on ARM Cortex-M Processors,” 2023 36th SBC/SBMicro/IEEE/ACM Symposium on Integrated Circuits and Systems Design (SBCCI), Rio de Janeiro, Brazil, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[100] G. Nagarajan, R. Madan Gopi, and R. Sanjai, “Role of Hash-based Signatures in Quantum Cryptography,” AIP Conference Proceedings, vol. 3075, no. 1, 2024. [CrossRef] [Google Scholar] [Publisher Link]
[101] What is Post-Quantum Cryptography?, National Institute of Standards and Technology (NIST), 2025. [Online]. Available: https://www.nist.gov/cybersecurity/what-post-quantum-cryptography
[102] National Institute of Standards and Technology, Post-Quantum Cryptography, Information Technology Laboratory, CSRC, 2026. [Online]. Available: https://csrc.nist.gov/projects/post-quantum-cryptography
[103] National Institute of Standards and Technology, Post-Quantum Cryptography, Information Technology, 2026. [Online]. Available: https://www.nist.gov/pqc
[104] Moses Dogonyaro Noel et al., “Review and Analysis of Classical Algorithms and Hash-based Post-Quantum Algorithm,” Journal of Reliable Intelligent Environments, vol. 8, no. 4, pp. 397-414, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[105] Philip Chidozie Nwaga, and Stephen Nwagwughiagwu, “Exploring the Significance of Quantum Cryptography in Future Network Security Protocols,” World Journal of Advanced Research and Reviews, vol. 24, no. 3, pp. 817-833, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[106] Abiodun Okunola, and Abey Litty, “The Human Factor in Quantum-Safe Cryptography Adoption: Assessing user Perceptions and Training Needs within Enterprise Environments,” SSRN, pp. 1-13, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[107] Abiodun Olaluwe et al., “Machine Learning and Side-Channel Attacks on Post-Quantum Cryptography,” Cryptology ePrint Archive, pp. 1-31, 2025.
[Google Scholar] [Publisher Link]
[108] Godwin Olaoye, “Quantum Cryptanalysis: Breaking Classical Encryption with Shor's and Grover's Algorithms,” Authorea, pp. 1-16, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[109] Oluchukwu Modesta Oluoha et al., “A Privacy-First Framework for Data Protection and Compliance Assurance in Digital Ecosystems,” Iconic Research and Engineering Journals, vol. 7, no. 4, pp. 620-646, 2023.
[Google Scholar] [Publisher Link]
[110] Anthony Owen, and Davids Pearson, “Investigate Quantum-Resistant Cryptography and Secure Communication Protocols,” IU International University of Applied Science, Erfurt, Germany, pp. 1-37, 2025.
[Google Scholar]
[111] Rajiv Pandey et al., Quantum Computing: A Shift from Bits to Qubits, 1st ed., Springer Singapore, vol. 1085, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[112] Swarna Panthi, and Bubu Bhuyan, “Quantum-Resistant Hash-based Digital Signature Schemes: A Review,” Proceedings of 4th International Conference on Frontiers in Computing and Systems: COMSYS, Goa, India, vol. 974, pp. 637-655, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[113] Raj Parikh, and Khushi Parikh, “Survey on Hardware Security: PUFs, Trojans, and Side-Channel Attacks,” Preprints.org, pp. 1-11, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[114] Sahib J. Parmar et al., “Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge Applications,” 2023 16th International Conference on Security of Information and Networks (SIN), Jaipur, India, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[115] J. Cameron Patterson, William J. Buchanan, and Callum Turino, “Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices,” Journal of Cybersecurity and Privacy, vol. 5, no. 3, pp. 1-25, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[116] Ray Perlner, John Kelsey, and David Cooper, “Breaking Category Five SPHINCS+ with SHA-256,” Post-Quantum Cryptography: 13th International Workshop, PQCrypto 2022, Virtual Event, Springer, Cham, vol. 13512, pp. 501-522, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[117] Tetiana Portovaras et al., “Ensuring Confidentiality and Data Security in Economic Analysis of Business Entities: Challenges and Solutions,” Multidisciplinary Reviews, vol. 7, no. 10, pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[118] Sunil Prajapat et al., “Secure Lattice-based Signature Scheme for Internet of Things Applications,” IEEE Access, vol. 13, pp. 75985-75999, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[119] John Preskill, Quantum Computing 40 Years Later, 2nd ed., Feynman Lectures on Computation, CRC Press, pp. 193-244, 2023.
[Google Scholar] [Publisher Link]
[120] Tomas Preucil, Petr Socha, and Martin Novotny, “Implementation of the Rainbow Signature Scheme on SoC FPGA,” 2022 25th Euromicro Conference on Digital System Design (DSD), Maspalomas, Spain, pp. 513-519, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[121] Mohamad Sadegh Sangari, Michael Lee, and Atefeh Mashatan, “Towards Quantum Threat Mitigation: An Empirical Investigation of the Factors Influencing Organizational Preparation Intentions,” Cybersecurity and Privacy, 2025.
[Google Scholar] [Publisher Link]
[122] Hwajeong Seo et al., “Supersingular Isogeny key Encapsulation (SIKE) Round 2 on ARM Cortex-M4,” IEEE Transactions on Computers, vol. 70, no. 10, pp. 1705-1718, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[123] Ami M. Shah, and Ashishkumar Gor, “Comprehensive Survey of Symmetric and Public-Key Cryptographic Algorithms: Foundations, Attacks, and Applications,” International Journal of Informative & Futuristic Research (IJIFR), vol. 12, no. 10, pp. 20-39, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[124] Parviz Sharifov et al., “Post-Quantum Cryptosystem of Niederreiter, Algorithm and Encryption Scheme: Modification and Optimization,” XIV International Scientific Conference “INTERAGROMASH 2021”, pp. 173-183, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[125] Shiang-Jiun Chen, and Yi-Hsueh Tsai, “Quantum-Safe Networks for 6G: An Integrated Survey on PQC, QKD, and Satellite QKD with Future Perspectives,” Computing&AI Connect, vol. 2, no. 1, pp. 1-16, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[126] Nitin Kumar Shingari, and Beenu Mago, “The Importance of Data Encryption in Ensuring the Confidentiality and Security of Financial Records of Medical Health,” 2024 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), Gwalior, India, pp. 1-6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[127] Harbaksh Singh, Managing the Quantum Cybersecurity Threat: Harvest Now, Decrypt Later, Quantum Computing, CRC Press, 1st ed., pp. 142-158, 2024.
[Google Scholar] [Publisher Link]
[128] Manmohan Singh, Sandeep Kumar Sood, and Munish Bhatia, “Post-Quantum Cryptography: A Review on Cryptographic Solutions for the Era of Quantum Computing,” Archives of Computational Methods in Engineering, pp. 1-42, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[129] Nehal Narendra Singh, “Post-Quantum Cryptography-Safe Network Architectures: Design Frameworks and Implementation Strategies for Enterprise Zero-Trust Environments,” Sarcouncil Journal of Engineering and Computer Sciences, vol. 4, no. 8, pp. 807-820, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[130] Pawandeep Singh et al., “Understanding RSA Algorithm in Cryptography,” Thesis, University of Jammu, 2024.
[Google Scholar]
[131] Gyeongju Song, and Hwajeong Seo, “Grover on Scrypt,” Electronics, vol. 13, no. 16, pp. 1-12, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[132] Deepraj Soni et al., Hardware Architectures for Post-Quantum Digital Signature Schemes, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[133] Mostefa Kara et al., “A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers based on a Modified LWE Structure,” Sensors, vol. 25, no. 15, pp. 1-17, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[134] Jakub Sowa et al., “Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways,” 2024 IEEE International Conference on Quantum Computing and Engineering (QCE), Montreal, QC, Canada, pp. 1835-1846, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[135] Vikas Srivastava, Anubhab Baksi, and Sumit Kumar Debnath, “An Overview of Hash based Signatures,” Cryptology ePrint Archive, 2023.
[Google Scholar] [Publisher Link]
[136] Tudor D. Stanescu, Introduction to Topological Quantum Matter & Quantum Computation, CRC Press, 2nd ed., Boca Raton, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[137] Purvi Tandel, and Jitendra Nasriwala, “Secure Authentication Framework for IoT Applications using a Hash-based Post-Quantum Signature Scheme,” Service Oriented Computing and Applications, vol. 19, no. 3, pp. 251-262, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[138] Monther Tarawneh, Perspective Chapter: Cryptography–Recent Advances and Research Perspectives, Biometrics and Cryptography, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[139] George Tasopoulos et al., “Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices,” Proceedings of the 20th ACM International Conference on Computing Frontiers, pp. 366-374, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[140] P. Thanalakshmi et al., “A Quantum-Resistant Blockchain System: A Comparative Analysis,” Mathematics, vol. 11, no. 18, pp. 1-19, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[141] Joshua J. Tom et al., “Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems,” International Journal of Engineering and Advanced Technology (IJEAT), vol. 12, no. 5, pp. 25-38, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[142] Marion Toussaint, Sylvère Krima, and Hervé Panetto, “Industry 4.0 Data Security: A Cybersecurity Frameworks Review,” Journal of Industrial Information Integration, vol. 39, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[143] Søren Toxvaerd, “Simulating Physics with Computers,” arXiv Preprint, pp. 1-14, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[144] Kyriaki Tsantikidou, and Nicolas Sklavos, “Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures,” Cryptography, vol. 8, no. 1, pp. 1-24, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[145] Samet Ünsal, “A Comparative Performance Evaluation of Kyber, sntrup761, and FrodoKEM for Post-Quantum Cryptography,” arXiv Preprint, pp. 1-5, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[146] Athanasios – Valavanidis, “Quantum Computin:. A Revolutionary Computing Capability to Sift through Huge Numbers of Possibilities and Extract Potential Solutions to Complex Problems,” vol. 1, pp. 1-25, 2024.
[Google Scholar]
[147] Lakkavaram S. M. Shriya Varnita et al., “A Study on Isogeny based Cryptography,” 2024 International Conference on Electronics, Computing, Communication and Control Technology (ICECCC), Bengaluru, India, pp. 1-6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[148] Kendre Saraswati Vasantrao, and Amit Saxena, “Bits to Qubits: An Overview of Quantum Computing,” 2025 International Conference on Intelligent Control, Computing and Communications (IC3), Mathura, India, pp. 120-124, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[149] Anyu Wang, Dianyan Xiao, and Yang Yu, “Lattice‐based Cryptosystems in Standardisation Processes: A Survey,” IET Information Security, vol. 17, no. 2, pp. 227-243, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[150] Chao Wang et al., “A First Successful Factorization of RSA-2048 Integer by D-Wave Quantum Computer,” Tsinghua Science and Technology, vol. 30, no. 3, pp. 1270-1282, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[151] Xiaoyun Wang, Guangwu Xu, and Yang Yu, “Lattice-based Cryptography: A Survey,” Chinese Annals of Mathematics, Series B, vol. 44, no. 6, pp. 945-960, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[152] Agung Mulyo Widodo et al., “Quantum-Resistant Cryptography,” Innovations in Modern Cryptography, pp. 101-132, 2024.
[Google Scholar]
[153] Hiu Yung Wong, Introduction to Quantum Computing: from a Layperson to a Programmer in 30 Steps, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[154] Faguo Wu et al., “Quantum-Resistant Blockchain and Performance Analysis,” The Journal of Supercomputing, vol. 81, no. 3, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[155] Zebo Yang, Maede Zolanvari, and Raj Jain, “A Survey of Important Issues in Quantum Computing and Communications,” IEEE Communications Surveys & Tutorials, vol. 25, no. 2, pp. 1059-1094, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[156] Zhouke Yu, “Research on Cryptography based on Quantum-Resistant Algorithms,” 2024 International Conference on Electronics and Devices, Computational Science (ICEDCS), Marseille, France, pp. 149-154, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[157] Pei Zeng et al., “Practical Hybrid PQC-QKD Protocols with Enhanced Security and Performance,” arXiv Preprint, pp. 1-12, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[158] Amirul Asyraf Zhahir et al., “Quantum Computing in the Cloud-A Systematic Literature Review,” International Journal of Electrical and Computer Engineering Systems, vol. 15, no. 2, pp. 185-200, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[159] Xiaokang Zhou et al., “Edge-Enabled Two-Stage Scheduling based on Deep Reinforcement Learning for Internet of Everything,” IEEE Internet of Things Journal, vol. 10, no. 4, pp. 3295-3304, 2022.
[CrossRef] [Google Scholar] [Publisher Link]