How to cite this paper
Hosseini, S & Pilaram, H. (2025). A comprehensive review of post-quantum cryptography: Challenges and advances.International Journal of Data and Network Science, 9(2), 267-288.
Refrences
Adj, G., Barbero, S., Bellini, E., Esser, A., Rivera-Zamarripa, L., Sanna, C., Verbel, J., & Zweydinger, F. (2024). MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(2), 304-328.
Al Busafi, S., & Kumar, B. (2020). Review and analysis of cryptography techniques. 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART),
Alkim, E., Barreto, P. S., Bindel, N., Krämer, J., Longa, P., & Ricardini, J. E. (2020). The lattice-based digital signature scheme qTESLA. International Conference on Applied Cryptography and Network Security,
Allgyer, W., White, T., & Youssef, T. A. (2024). Securing the Future: A Comprehensive Review of Post-Quantum Cryptography and Emerging Algorithms. SoutheastCon 2024, 1282-1287.
Aragon, N., Bardet, M., Bidoux, L., Chi-Domínguez, J.-J., Dyseryn, V., Feneuil, T., Gaborit, P., Joux, A., Rivain, M., & Tillich, J.-P. (2023). RYDE specifications.
Aragon, N., Bardet, M., Bidoux, L., Chi-Domínguez, J.-J., Dyseryn, V., Feneuil, T., Gaborit, P., Neveu, R., Rivain, M., & Tillich, J.-P. (2023). MIRA Specifications.
Aragon, N., Barreto, P., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J.-C., Gaborit, P., Ghosh, S., Gueron, S., & Güneysu, T. (2022). BIKE: bit flipping key encapsulation.
Bavdekar, R., Chopde, E. J., Agrawal, A., Bhatia, A., & Tiwari, K. (2023). Post quantum cryptography: A review of techniques, challenges and standardizations. 2023 International Conference on Information Networking (ICOIN),
Benadjila, R., Feneuil, T., & Rivain, M. (2024). MQ on my mind: Post-quantum signatures from the non-structured multivariate quadratic problem. 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P),
Berlekamp, E., McEliece, R., & Van Tilborg, H. (1978). On the inherent intractability of certain coding problems (corresp.). IEEE Transactions on Information Theory, 24(3), 384-386.
Bernstein, D. J., Chuengsatiansup, C., Lange, T., & van Vredendaal, C. (2018). NTRU prime: reducing attack surface at low cost. Selected Areas in Cryptography–SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers 24,
Bernstein, D. J., Hopwood, D., Hülsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., Schneider, M., Schwabe, P., & Wilcox-O’Hearn, Z. (2015). SPHINCS: practical stateless hash-based signatures. Annual international conference on the theory and applications of cryptographic techniques,
Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., & Schwabe, P. (2019). The SPHINCS+ signature framework. Proceedings of the 2019 ACM SIGSAC conference on computer and communications security,
Bettaieb, S., Bidoux, L., Budroni, A., Palumbi, M., & Perin, L. P. (2024). Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(4), 84-109.
Bettaieb, S., Bidoux, L., Dyseryn, V., Esser, A., Gaborit, P., Kulkarni, M., & Palumbi, M. (2024). PERK: compact signature scheme based on a new variant of the permuted kernel problem. Designs, Codes and Cryptography, 1-27.
Bettale, L., De Oliveira, M., & Dottax, E. (2022). Post-quantum protocols for banking applications. International Conference on Smart Card Research and Advanced Applications,
Beullens, W. (2022). Breaking rainbow takes a weekend on a laptop. Annual International Cryptology Conference,
Bidoux, L., Briaud, P., Bros, M., & Gaborit, P. (2023). RQC revisited and more cryptanalysis for rank-based cryptography. IEEE Transactions on Information Theory.
Boisrond, K., Tardif, P. M., & Jaafar, F. (2024). Ensuring the integrity, confidentiality, and availability of IoT data in Industry 5.0: A Systematic Mapping Study. IEEE access.
Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J. M., Schwabe, P., Seiler, G., & Stehlé, D. (2018). CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. 2018 IEEE European Symposium on Security and Privacy (EuroS&P),
Boyer, M., Brassard, G., Høyer, P., & Tapp, A. (1998). Tight bounds on quantum searching. Fortschritte der Physik: Progress of Physics, 46(4‐5), 493-505.
Brassard, G., Høyer, P., & Tapp, A. (1998). Quantum cryptanalysis of hash and claw-free functions. LATIN'98: Theoretical Informatics: Third Latin American Symposium Campinas, Brazil, April 20–24, 1998 Proceedings 3,
Buchmann, J., Dahmen, E., & Hülsing, A. (2011). XMSS-a practical forward secure signature scheme based on minimal security assumptions. Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings 4,
Budget of the U.S. Government FISCAL YEAR 2024. U.S. Office of Management and Budget.
Bui, D., Carozza, E., Couteau, G., Goudarzi, D., & Joux, A. (2024). Faster Signatures from MPC-in-the-Head. ASIACRYPT 2024-International Conference on the Theory and Application of Cryptology and Information Security,
Campagna, M., Costello, C., Hess, B., Jalali, A., Koziel, B., LaMacchia, B., Longa, P., Naehrig, M., Renes, J., & Urbanik, D. (2019). Supersingular isogeny key encapsulation. In.
Canto, A. C., Sarker, A., Kaur, J., Kermani, M. M., & Azarderakhsh, R. (2022). Error detection schemes assessed on FPGA for multipliers in lattice-based key encapsulation mechanisms in post-quantum cryptography. IEEE Transactions on Emerging Topics in Computing, 11(3), 791-797.
Cartor, R., & Smith-Tone, D. (2019). EFLASH: a new multivariate encryption scheme. Selected Areas in Cryptography–SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers 25,
Casanova, A., Faugere, J.-C., Macario-Rat, G., Patarin, J., Perret, L., & Ryckeghem, J. (2017). GeMSS: a great multivariate short signature UPMC-Paris 6 Sorbonne Universités; INRIA Paris Research Centre, MAMBA Team …].
Castryck, W., & Decru, T. (2023). An efficient key recovery attack on SIDH. Annual International Conference on the Theory and Applications of Cryptographic Techniques,
Castryck, W., Lange, T., Martindale, C., Panny, L., & Renes, J. (2018). CSIDH: an efficient post-quantum commutative group action. Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III 24,
Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., & Hassija, V. (2021). Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography. Computer Communications, 176, 99-118.
Childs, A., Jao, D., & Soukharev, V. (2014). Constructing elliptic curve isogenies in quantum subexponential time. Journal of Mathematical Cryptology, 8(1), 1-29.
D’Anvers, J.-P., Karmakar, A., Sinha Roy, S., & Vercauteren, F. (2018). Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings 10,
Daniel J. Bernstein, J. B., Erik Dahmen. (2009). Post-Quantum Cryptography (1 ed.). Springer Berlin, Heidelberg. https://doi.org/https://doi.org/10.1007/978-3-540-88702-7
De Feo, L., Jao, D., & Plût, J. (2014). Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Journal of Mathematical Cryptology, 8(3), 209-247.
Delfs, H., & Knebl, H. Introduction to cryptography (Vol. 2). Springer.
Deshpande, S., Xu, C., Nawan, M., Nawaz, K., & Szefer, J. (2023). Fast and efficient hardware implementation of HQC. International Conference on Selected Areas in Cryptography,
Dey, J., & Dutta, R. (2023). Progress in multivariate cryptography: Systematic review, challenges, and research directions. ACM Computing Surveys, 55(12), 1-34.
Dey, K., Debnath, S. K., Stănică, P., & Srivastava, V. (2022). A post-quantum signcryption scheme using isogeny based cryptography. Journal of Information Security and Applications, 69, 103280.
Ding, J., & Petzoldt, A. (2017). Current state of multivariate cryptography. IEEE Security & Privacy, 15(4), 28-36.
Ding, J., & Schmidt, D. (2005). Rainbow, a new multivariable polynomial signature scheme. International conference on applied cryptography and network security,
Du, W., & Atallah, M. J. (2001). Secure multi-party computation problems and their applications: a review and open problems. Proceedings of the 2001 workshop on New security paradigms,
Ducas, L., Espitau, T., & Postlethwaite, E. W. (2023). Finding short integer solutions when the modulus is small. Annual International Cryptology Conference,
Ducas, L., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., & Stehlé, D. (2018). Crystals–dilithium: Digital signatures from module lattices.
Fernández-Caramés, T. M. (2019). From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things. IEEE internet of things journal, 7(7), 6457-6480.
Fiat, A., & Shamir, A. (1986). How to prove yourself: Practical solutions to identification and signature problems. Conference on the theory and application of cryptographic techniques,
Fouque, P.-A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., & Zhang, Z. (2018). Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submission to the NIST’s post-quantum cryptography standardization process, 36(5), 1-75.
Gaithuru, J. N., Bakhtiari, M., Salleh, M., & Muteb, A. M. (2015). A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap. 2015 9th Malaysian Software Engineering Conference (MySEC),
Gharavi, H., Granjal, J., & Monteiro, E. (2024). Post-quantum blockchain security for the Internet of Things: Survey and research directions. IEEE Communications Surveys & Tutorials.
Goppa codes. (2003). IEEE Transactions on Information Theory, 19(5), 590-592.
Grover, L. K. (1996). A fast quantum mechanical algorithm for database search. Proceedings of the twenty-eighth annual ACM symposium on Theory of computing,
Hamlin, B., & Song, F. (2019). Quantum security of hash functions and property-preservation of iterated hashing. Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers 10,
Hasija, T., Ramkumar, K., Kaur, A., Mittal, S., & Singh, B. (2022). A survey on nist selected third round candidates for post quantum cryptography. 2022 7th International Conference on Communication and Electronics Systems (ICCES),
Hasija, T., Ramkumar, K., Singh, B., Kaur, A., & Mittal, S. K. (2023). Symmetric Key Cryptography: Review, Algorithmic Insights, and Challenges in the Era of Quantum Computers. 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT),
Hekkala, J., Muurman, M., Halunen, K., & Vallivaara, V. (2023). Implementing post-quantum cryptography for developers. SN Computer Science, 4(4), 365.
Hoffstein, J. (1998). NTRU: A Ring Based Public Key Cryptosystem. Algorithmic Number Theory (ANTS III).
Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J. H., & Whyte, W. (2003). NTRUSIGN: Digital signatures using the NTRU lattice. Cryptographers’ track at the RSA conference,
Ishai, Y., Kushilevitz, E., Ostrovsky, R., & Sahai, A. (2007). Zero-knowledge from secure multiparty computation. Proceedings of the thirty-ninth annual ACM symposium on Theory of computing,
Jao, D., & De Feo, L. (2011). Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings 4,
Joseph, D., Misoczki, R., Manzano, M., Tricot, J., Pinuaga, F. D., Lacombe, O., Leichenauer, S., Hidary, J., Venables, P., & Hansen, R. (2022). Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243.
Kamal, A., Ahmad, K., Hassan, R., & Khalim, K. (2021). NTRU Algorithm: Nth Degree truncated polynomial ring units. In Functional Encryption (pp. 103-115). Springer.
Kampanakis, P., & Lepoint, T. (2023). Vision paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments. International Conference on Research in Security Standardisation,
Kipnis, A., Patarin, J., & Goubin, L. (1999). Unbalanced oil and vinegar signature schemes. International Conference on the Theory and Applications of Cryptographic Techniques,
Koziel, B., Azarderakhsh, R., & Kermani, M. M. (2018). A high-performance and scalable hardware architecture for isogeny-based cryptography. IEEE Transactions on Computers, 67(11), 1594-1609.
Lamport, L. (1979). Constructing digital signatures from a one way function.
Liu, F., Zheng, Z., Gong, Z., Tian, K., Zhang, Y., Hu, Z., Li, J., & Xu, Q. (2024). A survey on lattice-based digital signature. Cybersecurity, 7(1), 7.
Lu, Y., & Yang, J. (2024). Quantum financing system: A survey on quantum algorithms, potential scenarios and open research issues. Journal of Industrial Information Integration, 100663.
Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., Affia, A.-A. O., Laurent, M., Sultan, N. H., & Tang, Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE access, 9, 36038-36077.
McEliece, R. J. (1978). A public-key cryptosystem based on algebraic. Coding Thv, 4244, 114-116.
Melchor, C. A., Aragon, N., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J.-C., Gaborit, P., Persichetti, E., Zémor, G., & Bourges, I. (2018). Hamming quasi-cyclic (HQC). NIST PQC Round, 2(4), 13.
Merkle, R. C. (1987). A digital signature based on a conventional encryption function. Conference on the theory and application of cryptographic techniques,
Merkle, R. C. (1989). A certified digital signature. Conference on the Theory and Application of Cryptology,
Moody, D., & Robinson, A. (2022). Cryptographic standards in the post-quantum era. IEEE Security & Privacy, 20(6), 66-72.
Moriya, T., Onuki, H., & Takagi, T. (2020). SiGamal: a supersingular isogeny-based PKE and its application to a PRF. Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II 26,
Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., & Cammarota, R. (2019). Post-quantum lattice-based cryptography implementations: A survey. ACM Computing Surveys (CSUR), 51(6), 1-41.
Oder, T., Speith, J., Höltgen, K., & Güneysu, T. (2019). Towards practical microcontroller implementation of the signature scheme Falcon. Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers 10,
Oliva delMoral, J., deMarti iOlius, A., Vidal, G., Crespo, P. M., & Martinez, J. E. (2024). Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective. IEEE internet of things journal.
Patarin, J., Courtois, N., & Goubin, L. (2001). FLASH, a Fast Multivariate Signature Algorithm: http://www. minrank. org/flash. Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA Conference 2001 San Francisco, CA, USA, April 8–12, 2001 Proceedings,
Peikert, C. (2016). A decade of lattice cryptography. Foundations and trends® in theoretical computer science, 10(4), 283-424.
Peng, C., Chen, J., Zeadally, S., & He, D. (2019). Isogeny-based cryptography: a promising post-quantum technique. IT Professional, 21(6), 27-32.
Ravi, P., Howe, J., Chattopadhyay, A., & Bhasin, S. (2021). Lattice-based key-sharing schemes: A survey. ACM Computing Surveys (CSUR), 54(1), 1-39.
Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM), 56(6), 1-40.
Reyzin, L., & Reyzin, N. (2002). Better than BiBa: Short one-time signatures with fast signing and verifying. Australasian Conference on Information Security and Privacy,
Rostovtsev, A., & Stolbunov, A. (2006). Public-key cryptosystem based on isogenies. Cryptology ePrint Archive.
Saarinen, M.-J. O. (2020). Mobile energy requirements of the upcoming NIST post-quantum cryptography standards. 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud),
Saha, R., Kumar, G., Devgun, T., Buchanan, W. J., Thomas, R., Alazab, M., Hoon-Kim, T., & Rodrigues, J. J. (2021). A blockchain framework in post-quantum decentralization. IEEE Transactions on Services Computing, 16(1), 1-12.
Seo, H., Anastasova, M., Jalali, A., & Azarderakhsh, R. (2020). Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4. IEEE Transactions on Computers, 70(10), 1705-1718.
Sharma, A. K., & Mittal, S. (2019). Cryptography & network security hash function applications, attacks and advances: A review. 2019 Third International Conference on Inventive Systems and Control (ICISC),
Shor, P. W. (1994). Algorithms for quantum computation: discrete logarithms and factoring. Proceedings 35th annual symposium on foundations of computer science,
Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review, 41(2), 303-332.
Stiawan, D., Idris, M. Y., Malik, R. F., Nurmaini, S., Alsharif, N., & Budiarto, R. (2019). Investigating brute force attack patterns in IoT network. Journal of Electrical and Computer Engineering, 2019(1), 4568368.
Sun, X., Yu, F. R., Zhang, P., Sun, Z., Xie, W., & Peng, X. (2021). A survey on zero-knowledge proof in blockchain. IEEE network, 35(4), 198-205.
Tan, T. G., Szalachowski, P., & Zhou, J. (2022). Challenges of post-quantum digital signing in real-world applications: A survey. International Journal of Information Security, 21(4), 937-952.
Tao, C., Diene, A., Tang, S., & Ding, J. (2013). Simple matrix scheme for encryption. Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings 5,
U.S. National Institute of Standards and Technology (NIST), Post-Quantum Cryptography. U.S. National Institute of Standards and Technology (NIST). csrc.nist.gov/Projects/post-quantum-cryptography
U.S. National Institute of Standards and Technology (NIST), Post-Quantum Cryptography - Additional Digital Signature Schemes. U.S. National Institute of Standards and Technology (NIST). csrc.nist.gov/Projects/pqc-dig-sig
Udin, M. N., Mohd Amin, F. A., Mat Abu, N. A., Mohamad Sarif, S. N., & Mohammad Zuki, N. A. (2022). Application of Lamport Digital Signature Scheme into the station-to-station protocol. Malaysian Journal of Computing (MJoC), 7(2), 1139-1149.
Verchyk, D., & Sepúlveda, J. (2023). A practical study of post-quantum enhanced identity-based encryption. Microprocessors and Microsystems, 99, 104828.
Yasuda, T., & Sakurai, K. (2016). A multivariate encryption scheme with rainbow. Information and Communications Security: 17th International Conference, ICICS 2015, Beijing, China, December 9–11, 2015, Revised Selected Papers 17.
Zeydan, E., Turk, Y., Aksoy, B., & Ozturk, S. B. (2022). Recent advances in post-quantum cryptography for networks: A survey. 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ).
Al Busafi, S., & Kumar, B. (2020). Review and analysis of cryptography techniques. 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART),
Alkim, E., Barreto, P. S., Bindel, N., Krämer, J., Longa, P., & Ricardini, J. E. (2020). The lattice-based digital signature scheme qTESLA. International Conference on Applied Cryptography and Network Security,
Allgyer, W., White, T., & Youssef, T. A. (2024). Securing the Future: A Comprehensive Review of Post-Quantum Cryptography and Emerging Algorithms. SoutheastCon 2024, 1282-1287.
Aragon, N., Bardet, M., Bidoux, L., Chi-Domínguez, J.-J., Dyseryn, V., Feneuil, T., Gaborit, P., Joux, A., Rivain, M., & Tillich, J.-P. (2023). RYDE specifications.
Aragon, N., Bardet, M., Bidoux, L., Chi-Domínguez, J.-J., Dyseryn, V., Feneuil, T., Gaborit, P., Neveu, R., Rivain, M., & Tillich, J.-P. (2023). MIRA Specifications.
Aragon, N., Barreto, P., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J.-C., Gaborit, P., Ghosh, S., Gueron, S., & Güneysu, T. (2022). BIKE: bit flipping key encapsulation.
Bavdekar, R., Chopde, E. J., Agrawal, A., Bhatia, A., & Tiwari, K. (2023). Post quantum cryptography: A review of techniques, challenges and standardizations. 2023 International Conference on Information Networking (ICOIN),
Benadjila, R., Feneuil, T., & Rivain, M. (2024). MQ on my mind: Post-quantum signatures from the non-structured multivariate quadratic problem. 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P),
Berlekamp, E., McEliece, R., & Van Tilborg, H. (1978). On the inherent intractability of certain coding problems (corresp.). IEEE Transactions on Information Theory, 24(3), 384-386.
Bernstein, D. J., Chuengsatiansup, C., Lange, T., & van Vredendaal, C. (2018). NTRU prime: reducing attack surface at low cost. Selected Areas in Cryptography–SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers 24,
Bernstein, D. J., Hopwood, D., Hülsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., Schneider, M., Schwabe, P., & Wilcox-O’Hearn, Z. (2015). SPHINCS: practical stateless hash-based signatures. Annual international conference on the theory and applications of cryptographic techniques,
Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., & Schwabe, P. (2019). The SPHINCS+ signature framework. Proceedings of the 2019 ACM SIGSAC conference on computer and communications security,
Bettaieb, S., Bidoux, L., Budroni, A., Palumbi, M., & Perin, L. P. (2024). Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(4), 84-109.
Bettaieb, S., Bidoux, L., Dyseryn, V., Esser, A., Gaborit, P., Kulkarni, M., & Palumbi, M. (2024). PERK: compact signature scheme based on a new variant of the permuted kernel problem. Designs, Codes and Cryptography, 1-27.
Bettale, L., De Oliveira, M., & Dottax, E. (2022). Post-quantum protocols for banking applications. International Conference on Smart Card Research and Advanced Applications,
Beullens, W. (2022). Breaking rainbow takes a weekend on a laptop. Annual International Cryptology Conference,
Bidoux, L., Briaud, P., Bros, M., & Gaborit, P. (2023). RQC revisited and more cryptanalysis for rank-based cryptography. IEEE Transactions on Information Theory.
Boisrond, K., Tardif, P. M., & Jaafar, F. (2024). Ensuring the integrity, confidentiality, and availability of IoT data in Industry 5.0: A Systematic Mapping Study. IEEE access.
Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J. M., Schwabe, P., Seiler, G., & Stehlé, D. (2018). CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. 2018 IEEE European Symposium on Security and Privacy (EuroS&P),
Boyer, M., Brassard, G., Høyer, P., & Tapp, A. (1998). Tight bounds on quantum searching. Fortschritte der Physik: Progress of Physics, 46(4‐5), 493-505.
Brassard, G., Høyer, P., & Tapp, A. (1998). Quantum cryptanalysis of hash and claw-free functions. LATIN'98: Theoretical Informatics: Third Latin American Symposium Campinas, Brazil, April 20–24, 1998 Proceedings 3,
Buchmann, J., Dahmen, E., & Hülsing, A. (2011). XMSS-a practical forward secure signature scheme based on minimal security assumptions. Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings 4,
Budget of the U.S. Government FISCAL YEAR 2024. U.S. Office of Management and Budget.
Bui, D., Carozza, E., Couteau, G., Goudarzi, D., & Joux, A. (2024). Faster Signatures from MPC-in-the-Head. ASIACRYPT 2024-International Conference on the Theory and Application of Cryptology and Information Security,
Campagna, M., Costello, C., Hess, B., Jalali, A., Koziel, B., LaMacchia, B., Longa, P., Naehrig, M., Renes, J., & Urbanik, D. (2019). Supersingular isogeny key encapsulation. In.
Canto, A. C., Sarker, A., Kaur, J., Kermani, M. M., & Azarderakhsh, R. (2022). Error detection schemes assessed on FPGA for multipliers in lattice-based key encapsulation mechanisms in post-quantum cryptography. IEEE Transactions on Emerging Topics in Computing, 11(3), 791-797.
Cartor, R., & Smith-Tone, D. (2019). EFLASH: a new multivariate encryption scheme. Selected Areas in Cryptography–SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers 25,
Casanova, A., Faugere, J.-C., Macario-Rat, G., Patarin, J., Perret, L., & Ryckeghem, J. (2017). GeMSS: a great multivariate short signature UPMC-Paris 6 Sorbonne Universités; INRIA Paris Research Centre, MAMBA Team …].
Castryck, W., & Decru, T. (2023). An efficient key recovery attack on SIDH. Annual International Conference on the Theory and Applications of Cryptographic Techniques,
Castryck, W., Lange, T., Martindale, C., Panny, L., & Renes, J. (2018). CSIDH: an efficient post-quantum commutative group action. Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III 24,
Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., & Hassija, V. (2021). Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography. Computer Communications, 176, 99-118.
Childs, A., Jao, D., & Soukharev, V. (2014). Constructing elliptic curve isogenies in quantum subexponential time. Journal of Mathematical Cryptology, 8(1), 1-29.
D’Anvers, J.-P., Karmakar, A., Sinha Roy, S., & Vercauteren, F. (2018). Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings 10,
Daniel J. Bernstein, J. B., Erik Dahmen. (2009). Post-Quantum Cryptography (1 ed.). Springer Berlin, Heidelberg. https://doi.org/https://doi.org/10.1007/978-3-540-88702-7
De Feo, L., Jao, D., & Plût, J. (2014). Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Journal of Mathematical Cryptology, 8(3), 209-247.
Delfs, H., & Knebl, H. Introduction to cryptography (Vol. 2). Springer.
Deshpande, S., Xu, C., Nawan, M., Nawaz, K., & Szefer, J. (2023). Fast and efficient hardware implementation of HQC. International Conference on Selected Areas in Cryptography,
Dey, J., & Dutta, R. (2023). Progress in multivariate cryptography: Systematic review, challenges, and research directions. ACM Computing Surveys, 55(12), 1-34.
Dey, K., Debnath, S. K., Stănică, P., & Srivastava, V. (2022). A post-quantum signcryption scheme using isogeny based cryptography. Journal of Information Security and Applications, 69, 103280.
Ding, J., & Petzoldt, A. (2017). Current state of multivariate cryptography. IEEE Security & Privacy, 15(4), 28-36.
Ding, J., & Schmidt, D. (2005). Rainbow, a new multivariable polynomial signature scheme. International conference on applied cryptography and network security,
Du, W., & Atallah, M. J. (2001). Secure multi-party computation problems and their applications: a review and open problems. Proceedings of the 2001 workshop on New security paradigms,
Ducas, L., Espitau, T., & Postlethwaite, E. W. (2023). Finding short integer solutions when the modulus is small. Annual International Cryptology Conference,
Ducas, L., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., & Stehlé, D. (2018). Crystals–dilithium: Digital signatures from module lattices.
Fernández-Caramés, T. M. (2019). From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things. IEEE internet of things journal, 7(7), 6457-6480.
Fiat, A., & Shamir, A. (1986). How to prove yourself: Practical solutions to identification and signature problems. Conference on the theory and application of cryptographic techniques,
Fouque, P.-A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., & Zhang, Z. (2018). Falcon: Fast-Fourier lattice-based compact signatures over NTRU. Submission to the NIST’s post-quantum cryptography standardization process, 36(5), 1-75.
Gaithuru, J. N., Bakhtiari, M., Salleh, M., & Muteb, A. M. (2015). A comprehensive literature review of asymmetric key cryptography algorithms for establishment of the existing gap. 2015 9th Malaysian Software Engineering Conference (MySEC),
Gharavi, H., Granjal, J., & Monteiro, E. (2024). Post-quantum blockchain security for the Internet of Things: Survey and research directions. IEEE Communications Surveys & Tutorials.
Goppa codes. (2003). IEEE Transactions on Information Theory, 19(5), 590-592.
Grover, L. K. (1996). A fast quantum mechanical algorithm for database search. Proceedings of the twenty-eighth annual ACM symposium on Theory of computing,
Hamlin, B., & Song, F. (2019). Quantum security of hash functions and property-preservation of iterated hashing. Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers 10,
Hasija, T., Ramkumar, K., Kaur, A., Mittal, S., & Singh, B. (2022). A survey on nist selected third round candidates for post quantum cryptography. 2022 7th International Conference on Communication and Electronics Systems (ICCES),
Hasija, T., Ramkumar, K., Singh, B., Kaur, A., & Mittal, S. K. (2023). Symmetric Key Cryptography: Review, Algorithmic Insights, and Challenges in the Era of Quantum Computers. 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT),
Hekkala, J., Muurman, M., Halunen, K., & Vallivaara, V. (2023). Implementing post-quantum cryptography for developers. SN Computer Science, 4(4), 365.
Hoffstein, J. (1998). NTRU: A Ring Based Public Key Cryptosystem. Algorithmic Number Theory (ANTS III).
Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J. H., & Whyte, W. (2003). NTRUSIGN: Digital signatures using the NTRU lattice. Cryptographers’ track at the RSA conference,
Ishai, Y., Kushilevitz, E., Ostrovsky, R., & Sahai, A. (2007). Zero-knowledge from secure multiparty computation. Proceedings of the thirty-ninth annual ACM symposium on Theory of computing,
Jao, D., & De Feo, L. (2011). Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. Post-Quantum Cryptography: 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings 4,
Joseph, D., Misoczki, R., Manzano, M., Tricot, J., Pinuaga, F. D., Lacombe, O., Leichenauer, S., Hidary, J., Venables, P., & Hansen, R. (2022). Transitioning organizations to post-quantum cryptography. Nature, 605(7909), 237-243.
Kamal, A., Ahmad, K., Hassan, R., & Khalim, K. (2021). NTRU Algorithm: Nth Degree truncated polynomial ring units. In Functional Encryption (pp. 103-115). Springer.
Kampanakis, P., & Lepoint, T. (2023). Vision paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments. International Conference on Research in Security Standardisation,
Kipnis, A., Patarin, J., & Goubin, L. (1999). Unbalanced oil and vinegar signature schemes. International Conference on the Theory and Applications of Cryptographic Techniques,
Koziel, B., Azarderakhsh, R., & Kermani, M. M. (2018). A high-performance and scalable hardware architecture for isogeny-based cryptography. IEEE Transactions on Computers, 67(11), 1594-1609.
Lamport, L. (1979). Constructing digital signatures from a one way function.
Liu, F., Zheng, Z., Gong, Z., Tian, K., Zhang, Y., Hu, Z., Li, J., & Xu, Q. (2024). A survey on lattice-based digital signature. Cybersecurity, 7(1), 7.
Lu, Y., & Yang, J. (2024). Quantum financing system: A survey on quantum algorithms, potential scenarios and open research issues. Journal of Industrial Information Integration, 100663.
Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., Affia, A.-A. O., Laurent, M., Sultan, N. H., & Tang, Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE access, 9, 36038-36077.
McEliece, R. J. (1978). A public-key cryptosystem based on algebraic. Coding Thv, 4244, 114-116.
Melchor, C. A., Aragon, N., Bettaieb, S., Bidoux, L., Blazy, O., Deneuville, J.-C., Gaborit, P., Persichetti, E., Zémor, G., & Bourges, I. (2018). Hamming quasi-cyclic (HQC). NIST PQC Round, 2(4), 13.
Merkle, R. C. (1987). A digital signature based on a conventional encryption function. Conference on the theory and application of cryptographic techniques,
Merkle, R. C. (1989). A certified digital signature. Conference on the Theory and Application of Cryptology,
Moody, D., & Robinson, A. (2022). Cryptographic standards in the post-quantum era. IEEE Security & Privacy, 20(6), 66-72.
Moriya, T., Onuki, H., & Takagi, T. (2020). SiGamal: a supersingular isogeny-based PKE and its application to a PRF. Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II 26,
Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., & Cammarota, R. (2019). Post-quantum lattice-based cryptography implementations: A survey. ACM Computing Surveys (CSUR), 51(6), 1-41.
Oder, T., Speith, J., Höltgen, K., & Güneysu, T. (2019). Towards practical microcontroller implementation of the signature scheme Falcon. Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers 10,
Oliva delMoral, J., deMarti iOlius, A., Vidal, G., Crespo, P. M., & Martinez, J. E. (2024). Cybersecurity in Critical Infrastructures: A Post-Quantum Cryptography Perspective. IEEE internet of things journal.
Patarin, J., Courtois, N., & Goubin, L. (2001). FLASH, a Fast Multivariate Signature Algorithm: http://www. minrank. org/flash. Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA Conference 2001 San Francisco, CA, USA, April 8–12, 2001 Proceedings,
Peikert, C. (2016). A decade of lattice cryptography. Foundations and trends® in theoretical computer science, 10(4), 283-424.
Peng, C., Chen, J., Zeadally, S., & He, D. (2019). Isogeny-based cryptography: a promising post-quantum technique. IT Professional, 21(6), 27-32.
Ravi, P., Howe, J., Chattopadhyay, A., & Bhasin, S. (2021). Lattice-based key-sharing schemes: A survey. ACM Computing Surveys (CSUR), 54(1), 1-39.
Regev, O. (2009). On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM), 56(6), 1-40.
Reyzin, L., & Reyzin, N. (2002). Better than BiBa: Short one-time signatures with fast signing and verifying. Australasian Conference on Information Security and Privacy,
Rostovtsev, A., & Stolbunov, A. (2006). Public-key cryptosystem based on isogenies. Cryptology ePrint Archive.
Saarinen, M.-J. O. (2020). Mobile energy requirements of the upcoming NIST post-quantum cryptography standards. 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud),
Saha, R., Kumar, G., Devgun, T., Buchanan, W. J., Thomas, R., Alazab, M., Hoon-Kim, T., & Rodrigues, J. J. (2021). A blockchain framework in post-quantum decentralization. IEEE Transactions on Services Computing, 16(1), 1-12.
Seo, H., Anastasova, M., Jalali, A., & Azarderakhsh, R. (2020). Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4. IEEE Transactions on Computers, 70(10), 1705-1718.
Sharma, A. K., & Mittal, S. (2019). Cryptography & network security hash function applications, attacks and advances: A review. 2019 Third International Conference on Inventive Systems and Control (ICISC),
Shor, P. W. (1994). Algorithms for quantum computation: discrete logarithms and factoring. Proceedings 35th annual symposium on foundations of computer science,
Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review, 41(2), 303-332.
Stiawan, D., Idris, M. Y., Malik, R. F., Nurmaini, S., Alsharif, N., & Budiarto, R. (2019). Investigating brute force attack patterns in IoT network. Journal of Electrical and Computer Engineering, 2019(1), 4568368.
Sun, X., Yu, F. R., Zhang, P., Sun, Z., Xie, W., & Peng, X. (2021). A survey on zero-knowledge proof in blockchain. IEEE network, 35(4), 198-205.
Tan, T. G., Szalachowski, P., & Zhou, J. (2022). Challenges of post-quantum digital signing in real-world applications: A survey. International Journal of Information Security, 21(4), 937-952.
Tao, C., Diene, A., Tang, S., & Ding, J. (2013). Simple matrix scheme for encryption. Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings 5,
U.S. National Institute of Standards and Technology (NIST), Post-Quantum Cryptography. U.S. National Institute of Standards and Technology (NIST). csrc.nist.gov/Projects/post-quantum-cryptography
U.S. National Institute of Standards and Technology (NIST), Post-Quantum Cryptography - Additional Digital Signature Schemes. U.S. National Institute of Standards and Technology (NIST). csrc.nist.gov/Projects/pqc-dig-sig
Udin, M. N., Mohd Amin, F. A., Mat Abu, N. A., Mohamad Sarif, S. N., & Mohammad Zuki, N. A. (2022). Application of Lamport Digital Signature Scheme into the station-to-station protocol. Malaysian Journal of Computing (MJoC), 7(2), 1139-1149.
Verchyk, D., & Sepúlveda, J. (2023). A practical study of post-quantum enhanced identity-based encryption. Microprocessors and Microsystems, 99, 104828.
Yasuda, T., & Sakurai, K. (2016). A multivariate encryption scheme with rainbow. Information and Communications Security: 17th International Conference, ICICS 2015, Beijing, China, December 9–11, 2015, Revised Selected Papers 17.
Zeydan, E., Turk, Y., Aksoy, B., & Ozturk, S. B. (2022). Recent advances in post-quantum cryptography for networks: A survey. 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ).