{"id":"https://openalex.org/W7123343478","doi":"https://doi.org/10.1109/icspis67605.2025.11318393","title":"Post-Quantum Cryptography: A Review of Algorithms, Challenges, and Future Research Directions","display_name":"Post-Quantum Cryptography: A Review of Algorithms, Challenges, and Future Research Directions","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W7123343478","doi":"https://doi.org/10.1109/icspis67605.2025.11318393"},"language":null,"primary_location":{"id":"doi:10.1109/icspis67605.2025.11318393","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspis67605.2025.11318393","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Signal Processing and Information Security (ICSPIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029603916","display_name":"Parth Sane","orcid":"https://orcid.org/0000-0002-2916-0978"},"institutions":[{"id":"https://openalex.org/I2800703609","display_name":"High Energy Materials Research Laboratory","ror":"https://ror.org/03zeqmc64","country_code":"IN","type":"facility","lineage":["https://openalex.org/I1340206300","https://openalex.org/I2800703609","https://openalex.org/I4210150591"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Parth Sane","raw_affiliation_strings":["Atos,Software Engineering, AMS,Pune,India"],"affiliations":[{"raw_affiliation_string":"Atos,Software Engineering, AMS,Pune,India","institution_ids":["https://openalex.org/I2800703609"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017066482","display_name":"Samrat Pravin Patel","orcid":null},"institutions":[{"id":"https://openalex.org/I143302722","display_name":"University of Kentucky","ror":"https://ror.org/02k3smh20","country_code":"US","type":"education","lineage":["https://openalex.org/I143302722"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Samrat P Patel","raw_affiliation_strings":["University of Kentucky,Electrical and Computer Engineering Department,Lexington,KY,USA"],"affiliations":[{"raw_affiliation_string":"University of Kentucky,Electrical and Computer Engineering Department,Lexington,KY,USA","institution_ids":["https://openalex.org/I143302722"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5029603916"],"corresponding_institution_ids":["https://openalex.org/I2800703609"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85813356,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.38909998536109924,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.38909998536109924,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.27149999141693115,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.11729999631643295,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7021999955177307},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6815000176429749},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5929999947547913},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.5881999731063843},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4828000068664551},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4772999882698059},{"id":"https://openalex.org/keywords/post-quantum-cryptography","display_name":"Post-quantum cryptography","score":0.36660000681877136}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7064999938011169},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7021999955177307},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6815000176429749},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5929999947547913},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.5881999731063843},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4828000068664551},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4772999882698059},{"id":"https://openalex.org/C108277079","wikidata":"https://www.wikidata.org/wiki/Q7233576","display_name":"Post-quantum cryptography","level":4,"score":0.36660000681877136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3614000082015991},{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.35370001196861267},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3508000075817108},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.3359000086784363},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33230000734329224},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.3098999857902527},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3027999997138977},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2874999940395355},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.27219998836517334},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2669000029563904}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icspis67605.2025.11318393","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspis67605.2025.11318393","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Signal Processing and Information Security (ICSPIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4197905659675598,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,139],"advance":[1],"of":[2,38,65,121,153],"quantum":[3,66,165],"computing":[4],"poses":[5],"significant":[6],"risks":[7],"to":[8,17,112,156],"traditional":[9],"cryptographic":[10],"systems,":[11],"including":[12,103],"RSA":[13],"and":[14,47,55,71,82,100,125,136,148,161],"ECC,":[15],"due":[16],"algorithms":[18],"such":[19,97],"as":[20,98,142],"Shor\u2019s,":[21],"prompting":[22],"an":[23],"urgent":[24],"need":[25],"for":[26,129,146],"robust":[27],"post-quantum":[28],"cryptography":[29,155],"(PQC)":[30],"solutions.":[31],"This":[32],"paper":[33],"presents":[34],"a":[35,143],"systematic":[36],"review":[37,140],"PQC":[39,123],"algorithms,":[40],"encompassing":[41],"lattice-based,":[42],"code-based,":[43],"multivariate":[44],"polynomial,":[45],"hash-based,":[46],"supersingular":[48],"isogeny-based":[49,101],"cryptography.":[50],"By":[51],"evaluating":[52],"recent":[53],"publications":[54],"NIST":[56],"standardization":[57],"efforts,":[58],"we":[59],"assess":[60],"these":[61],"approaches":[62],"in":[63,79,163],"terms":[64],"resistance,":[67],"computational":[68,114],"efficiency,":[69],"scalability,":[70],"implementation":[72],"challenges.":[73],"Lattice-based":[74],"schemes,":[75],"notably":[76],"CRYSTALS-Kyber,":[77],"excel":[78],"quantum-secure":[80],"encryption":[81],"performance,":[83],"whereas":[84],"code-based":[85],"systems":[86],"like":[87,133],"McEliece":[88],"are":[89],"hindered":[90],"by":[91],"large":[92],"key":[93],"sizes.":[94],"Hash-based":[95],"signatures,":[96],"SPHINCS+,":[99],"protocols,":[102],"SIDH,":[104],"provide":[105],"promising":[106],"alternatives":[107],"but":[108],"require":[109],"further":[110],"optimization":[111],"reduce":[113],"overhead.":[115],"Our":[116],"analysis":[117],"highlights":[118],"the":[119,151,164],"potential":[120],"hybrid":[122],"methods":[124],"lightweight":[126],"hardware":[127],"implementations":[128],"securing":[130],"emerging":[131],"domains":[132],"IoT,":[134],"blockchain,":[135],"financial":[137],"systems.":[138],"serves":[141],"foundational":[144],"resource":[145],"researchers":[147],"practitioners,":[149],"advocating":[150],"adoption":[152],"quantum-resistant":[154],"preserve":[157],"data":[158],"confidentiality,":[159],"integrity,":[160],"authenticity":[162],"era.":[166]},"counts_by_year":[],"updated_date":"2026-01-14T00:46:21.520733","created_date":"2026-01-14T00:00:00"}
