Impact of quantum computing on modern cryptography and cybersecurity
[Compilation Failed]
References
-
Avireneni, R. T., Koneru, S. H., Yelkoti, N. K. K. R. & Khaga, S. Y. (2024). Quantum-Safe Cryptography: Securing the Post-Quantum Era through AI-Driven Innovations European Journal of Technology.
-
Darzi, S., Ahmadi, K., Aghapour, S., Yavuz, A. A. & Kermani, M. M. (2023). Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities ArXiv.
-
Fritzmann, T., Sigl, G. & Sepúlveda, J. (2020). RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography IACR Transactions on Cryptographic Hardware and Embedded Systems.
-
Fritzmann, T., Van Beirendonck, M., Roy, D. B., Karl, P., Schamberger, T., Verbauwhede, I. & Sigl, G. (2021). Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography IACR Transactions on Cryptographic Hardware and Embedded Systems.
-
Greconici, D. O. C., Kannwischer, M. J. & Sprenkels, A. (2020). Compact Dilithium Implementations on Cortex-M3 and Cortex-M4 IACR Transactions on Cryptographic Hardware and Embedded Systems.
-
Mohana, P. V. A. (2020). Post–Quantum Cryptography – A Primer.
-
Palanivel, M. & Selvadurai, K. (2014). Risk-driven security testing using risk analysis with threat modeling approach SpringerPlus.
-
Ravi, P., Chattopadhyay, A., D'Anvers, J. & Baksi, A. (2023). Side-channel and Fault-injection attacks over Lattice-based Post-quantum Schemes (Kyber, Dilithium): Survey and New Results ACM Transactions on Embedded Computing Systems.
-
Schöffel, M., Lauer, F., Rheinländer, C. C. & Wehn, N. (2022). Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks? Sensors.
-
Shajahan, R., Jain, K. & Krishnan, P. (2024). A Survey on NIST 3rd Round Post Quantum Digital Signature Algorithms 2024 5th International Conference on Mobile Computing and Sustainable Informatics (ICMCSI).
-
arxiv.org. (Accessed 2025-12-21). A Survey of Post-Quantum Cryptography Support in Cryptographic .... Retrieved from https://arxiv.org/html/2508.16078v1
-
arxiv.org. (Accessed 2025-12-21). Post-Quantum Cryptography and Quantum-Safe Security. Retrieved from https://arxiv.org/html/2510.10436v1
-
sciencedirect.com. (Accessed 2025-12-21). The Impact of Quantum Computing on Cybersecurity—Threats .... Retrieved from https://www.sciencedirect.com/science/article/abs/pii/S0045790625005920