Main Article Content
Abstract
Keywords
Article Details
Copyright (c) 2025 Noor Thamer Mahmood (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
- L. Chen et al., “Report on Post-Quantum Cryptography,” NISTIR 8105, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2016.doi: http://dx.doi.org/10.6028/NIST.IR.8105
- D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography, Springer, Berlin, Germany, 2009.
- M. Mosca, “Cybersecurity in an era with quantum computers: Will we be ready?” IEEE Security & Privacy, vol. 16, no. 5, pp. 38–41, Sep.–Oct. 2018.doi: https://doi.org/10.1109/msp.2018.3761723
- R. Perlner and D. Cooper, “Quantum-resistant public-key cryptography,” in Proc. NIST Workshop on Cybersecurity in a Post-Quantum World, Gaithersburg, MD, USA, 2015.doi: https://doi.org/10.1145/1527017.1527028
- E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe, “Post-quantum key exchange—A new hope,” 25th USENIX Security Symposium, pp. 327–343, 2016
- P. Schwabe, D. Stebila, and T. Wiggers, “Post-quantum TLS without handshake signatures,” Proc. ACM CCS, pp. 1461–1480, 2020.doi: https://doi.org/10.1145/3372297.3423350
- A. Bindel, J. Brendel, M. Fischlin, and D. Gonçalves, “Hybrid key encapsulation mechanisms and authenticated key exchange,” IACR Cryptology ePrint Archive, Report 2019/016.doi: https://doi.org/10.1007/978-3-030-25510-7_12
- J. Ding and J. Buchmann, “Post-quantum cryptography for constrained devices,” IEEE Security & Privacy Workshops, pp. 33–40, 2018.doi: https://doi.org/10.5220/0010903000003120
- I. Şafak, F. Alagöz, and E. Anarim, “Post-Quantum Security Measures for the Internet of Things,” in Encyclopedia of Information Science and Technology, 6th ed., IGI Global, 2025, pp. 1–44, doi: https://doi.org/1010.4018/978-1-6684-7366-5.ch075
- A. Alomari and S. A. P. Kumar, “Securing IoT systems in a post‑quantum environment: Vulnerabilities, attacks, and possible solutions,” Internet of Things, vol. 25, no. C, art. 101132, Apr. 2024, doi: https://doi.org/1010.1016/j.iot.2024.101132.
- Y. Liu, K. Gai, L. Qiu, and M. Qiu, “Security and privacy issues of IoT: A survey,” Future Generation Computer Systems, vol. 95, pp. 846–859, Jun. 2019.
- S. Singh, P. K. Sharma, and J. H. Park, “Security issues and challenges in IoT-based environments,” IEEE Access, vol. 5, pp. 16394–16415, 2017.
- S. Kumari, M. Singh, R. Singh, and H. Tewari, “Post-quantum cryptography techniques for secure communication in resource-constrained IoT devices: A comprehensive survey,” Software: Practice and Experience, vol. 52, no. 10, pp. 2047–2076, 2022.
- J.-A. Septien-Hernandez et al., “A comparative study of post-quantum cryptosystems for Internet-of-Things applications,” Sensors, vol. 22, no. 2, art. 489, 2022.doi: https://doi.org/10.3390/s22020489
- R. Asif, “Post‑Quantum Cryptosystems for Internet‑of‑Things: A Survey on Lattice‑Based Algorithms,” IoT, vol. 2, no. 1, pp. 71–91, Feb. 2021, doi: https://doi.org/1010.3390/iot2010005
- NIST, “Post-Quantum Cryptography Standardization,” National Institute of Standards and Technology, 2022.
- D. Stebila, J. Chung, J. Baek, and J. Uher, “TLS hybrid design for post-quantum cryptography,” IEEE European Symposium on Security and Privacy, 2019.
- M. Campagna, et al., “Quantum-safe cryptography and security,” ETSI White Paper No. 8, European Telecommunications Standards Institute (ETSI), 2015. [Online]. Available: https://www.etsi.org/white-papers
- P. Nguyen and B. Vallée, “The LLL algorithm: Survey and applications,” Information and CommunicationsSecurity, Springer, 2010.
- J. Hoffstein, J. Pipher, and J. H. Silverman, An Introduction to Mathematical Cryptography, 2nd ed., Springer, 2014.
References
L. Chen et al., “Report on Post-Quantum Cryptography,” NISTIR 8105, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2016.doi: http://dx.doi.org/10.6028/NIST.IR.8105
D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography, Springer, Berlin, Germany, 2009.
M. Mosca, “Cybersecurity in an era with quantum computers: Will we be ready?” IEEE Security & Privacy, vol. 16, no. 5, pp. 38–41, Sep.–Oct. 2018.doi: https://doi.org/10.1109/msp.2018.3761723
R. Perlner and D. Cooper, “Quantum-resistant public-key cryptography,” in Proc. NIST Workshop on Cybersecurity in a Post-Quantum World, Gaithersburg, MD, USA, 2015.doi: https://doi.org/10.1145/1527017.1527028
E. Alkim, L. Ducas, T. Pöppelmann, and P. Schwabe, “Post-quantum key exchange—A new hope,” 25th USENIX Security Symposium, pp. 327–343, 2016
P. Schwabe, D. Stebila, and T. Wiggers, “Post-quantum TLS without handshake signatures,” Proc. ACM CCS, pp. 1461–1480, 2020.doi: https://doi.org/10.1145/3372297.3423350
A. Bindel, J. Brendel, M. Fischlin, and D. Gonçalves, “Hybrid key encapsulation mechanisms and authenticated key exchange,” IACR Cryptology ePrint Archive, Report 2019/016.doi: https://doi.org/10.1007/978-3-030-25510-7_12
J. Ding and J. Buchmann, “Post-quantum cryptography for constrained devices,” IEEE Security & Privacy Workshops, pp. 33–40, 2018.doi: https://doi.org/10.5220/0010903000003120
I. Şafak, F. Alagöz, and E. Anarim, “Post-Quantum Security Measures for the Internet of Things,” in Encyclopedia of Information Science and Technology, 6th ed., IGI Global, 2025, pp. 1–44, doi: https://doi.org/1010.4018/978-1-6684-7366-5.ch075
A. Alomari and S. A. P. Kumar, “Securing IoT systems in a post‑quantum environment: Vulnerabilities, attacks, and possible solutions,” Internet of Things, vol. 25, no. C, art. 101132, Apr. 2024, doi: https://doi.org/1010.1016/j.iot.2024.101132.
Y. Liu, K. Gai, L. Qiu, and M. Qiu, “Security and privacy issues of IoT: A survey,” Future Generation Computer Systems, vol. 95, pp. 846–859, Jun. 2019.
S. Singh, P. K. Sharma, and J. H. Park, “Security issues and challenges in IoT-based environments,” IEEE Access, vol. 5, pp. 16394–16415, 2017.
S. Kumari, M. Singh, R. Singh, and H. Tewari, “Post-quantum cryptography techniques for secure communication in resource-constrained IoT devices: A comprehensive survey,” Software: Practice and Experience, vol. 52, no. 10, pp. 2047–2076, 2022.
J.-A. Septien-Hernandez et al., “A comparative study of post-quantum cryptosystems for Internet-of-Things applications,” Sensors, vol. 22, no. 2, art. 489, 2022.doi: https://doi.org/10.3390/s22020489
R. Asif, “Post‑Quantum Cryptosystems for Internet‑of‑Things: A Survey on Lattice‑Based Algorithms,” IoT, vol. 2, no. 1, pp. 71–91, Feb. 2021, doi: https://doi.org/1010.3390/iot2010005
NIST, “Post-Quantum Cryptography Standardization,” National Institute of Standards and Technology, 2022.
D. Stebila, J. Chung, J. Baek, and J. Uher, “TLS hybrid design for post-quantum cryptography,” IEEE European Symposium on Security and Privacy, 2019.
M. Campagna, et al., “Quantum-safe cryptography and security,” ETSI White Paper No. 8, European Telecommunications Standards Institute (ETSI), 2015. [Online]. Available: https://www.etsi.org/white-papers
P. Nguyen and B. Vallée, “The LLL algorithm: Survey and applications,” Information and CommunicationsSecurity, Springer, 2010.
J. Hoffstein, J. Pipher, and J. H. Silverman, An Introduction to Mathematical Cryptography, 2nd ed., Springer, 2014.
