Impact of quantum computing on modern cryptography and cybersecurity

Research Paper2 wordsharvard citations12/21/2025

[Compilation Failed]

References

  • Avireneni, R. T., Koneru, S. H., Yelkoti, N. K. K. R. & Khaga, S. Y. (2024). Quantum-Safe Cryptography: Securing the Post-Quantum Era through AI-Driven Innovations European Journal of Technology.

  • Darzi, S., Ahmadi, K., Aghapour, S., Yavuz, A. A. & Kermani, M. M. (2023). Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities ArXiv.

  • Fritzmann, T., Sigl, G. & Sepúlveda, J. (2020). RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography IACR Transactions on Cryptographic Hardware and Embedded Systems.

  • Fritzmann, T., Van Beirendonck, M., Roy, D. B., Karl, P., Schamberger, T., Verbauwhede, I. & Sigl, G. (2021). Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography IACR Transactions on Cryptographic Hardware and Embedded Systems.

  • Greconici, D. O. C., Kannwischer, M. J. & Sprenkels, A. (2020). Compact Dilithium Implementations on Cortex-M3 and Cortex-M4 IACR Transactions on Cryptographic Hardware and Embedded Systems.

  • Mohana, P. V. A. (2020). Post–Quantum Cryptography – A Primer.

  • Palanivel, M. & Selvadurai, K. (2014). Risk-driven security testing using risk analysis with threat modeling approach SpringerPlus.

  • Ravi, P., Chattopadhyay, A., D'Anvers, J. & Baksi, A. (2023). Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results ACM Transactions on Embedded Computing Systems.

  • Schöffel, M., Lauer, F., Rheinländer, C. C. & Wehn, N. (2022). Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks? Sensors.

  • Shajahan, R., Jain, K. & Krishnan, P. (2024). A Survey on NIST 3rd Round Post Quantum Digital Signature Algorithms 2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI).

  • arxiv.org. (Accessed 2025-12-21). A Survey of Post-Quantum Cryptography Support in Cryptographic .... Retrieved from https://arxiv.org/html/2508.16078v1

  • arxiv.org. (Accessed 2025-12-21). Post-Quantum Cryptography and Quantum-Safe Security. Retrieved from https://arxiv.org/html/2510.10436v1

  • sciencedirect.com. (Accessed 2025-12-21). The Impact of Quantum Computing on Cybersecurity—Threats .... Retrieved from https://www.sciencedirect.com/science/article/abs/pii/S0045790625005920