{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T16:03:25Z","timestamp":1778429005834,"version":"3.51.4"},"reference-count":129,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing. This paper reviews the PQC research landscape and identifies open challenges and future directions for the critical transition to PQC in digital networking systems. Building on the NIST standardization process which has hardened the PQC cipher algorithm security, this paper analyzes and describes the recent research on PQC implementations and integrations into scalable and standardized networking systems (Internet, web and cellular networks). We review research on the security, side-channel threats, performances, overheads, and compatibility of PQC ciphers. We also study the research incorporating PQC into the standardized web and cellular networking protocols, ranging from testing the PQC feasibility to proposing protocol solutions and mechanisms to enable PQC. Our study highlights the PQC challenge of large parameter sizes, common across the PQC cipher algorithms, and the research proposing protocol- and system-level mechanisms to address them. Informed by the survey, this paper identifies and highlights the research gaps and future directions to facilitate further research and development for PQC and to secure next-generation digital networking systems.<\/jats:p>","DOI":"10.3390\/cryptography10010012","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T15:28:11Z","timestamp":1770910091000},"page":"12","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions"],"prefix":"10.3390","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5736-5823","authenticated-orcid":false,"given":"Sang-Yoon","family":"Chang","sequence":"first","affiliation":[{"name":"Computer Science Department, University of Colorado Colorado Springs, 1420 Austin Bluffs Pkwy, Colorado Springs, CO 80918, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5143-5181","authenticated-orcid":false,"given":"Qaiser","family":"Khan","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Colorado Colorado Springs, 1420 Austin Bluffs Pkwy, Colorado Springs, CO 80918, USA"}]}],"member":"1968","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"key":"ref_1","unstructured":"Shor, P.W. (1994, January 20\u201322). Algorithms for Quantum Computation: Discrete Logarithms and Factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science (FOCS), Santa Fe, NM, USA."},{"key":"ref_2","unstructured":"U.S. Congress (2025, December 10). Quantum Computing Cybersecurity Preparedness Act (Public Law 117\u2013260). 117th Congress, 21 December 2022, Available online: https:\/\/www.govinfo.gov\/app\/details\/PLAW-117publ260."},{"key":"ref_3","unstructured":"(2025, December 10). Open Quantum Safe. Liboqs Version 0.15.0 Release. Available online: https:\/\/github.com\/open-quantum-safe\/liboqs\/releases\/tag\/0.15.0."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","article-title":"Transitioning Organizations to Post-Quantum Cryptography","volume":"605","author":"Joseph","year":"2022","journal-title":"Nature"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Ahmed, N., Zhang, L., and Gangopadhyay, A. (2025). A Survey of Post-Quantum Cryptography Support in Cryptographic Libraries. arXiv.","DOI":"10.1109\/QCE65121.2025.00102"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Dam, D.T., Tran, T.H., Hoang, V.P., Pham, C.K., and Hoang, T.T. (2023). A Survey of Post-Quantum Cryptography: Start of a New Race. Cryptography, 7.","DOI":"10.3390\/cryptography7030040"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Singh, M., Sood, S.K., and Bhatia, M. (2025). Post-quantum Cryptography: A Review on Cryptographic Solutions for the Era of Quantum Computing. Arch. Comput. Methods Eng., 1\u201342.","DOI":"10.1007\/s11831-025-10412-7"},{"key":"ref_8","first-page":"212","article-title":"Analysis of Post-Quantum Cryptographic Algorithms: A Systematic Literature Review","volume":"Volume 957","year":"2024","journal-title":"Proceedings of the International Joint Conferences (ICEUTE 2024, CISIS 2024), Salamanca, Spain, 8\u201310 October 2024"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"132107","DOI":"10.1109\/ACCESS.2024.3450306","article-title":"Migrating Software Systems Toward Post-Quantum Cryptography-A Systematic Literature Review","volume":"12","author":"Herzinger","year":"2024","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"10160","DOI":"10.1109\/ACCESS.2025.3528562","article-title":"A Survey of Post-Quantum Cryptography Migration in Vehicles","volume":"13","author":"Lohmiller","year":"2025","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer","volume":"41","author":"Shor","year":"1999","journal-title":"SIAM Rev."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1038\/414883a","article-title":"Experimental realization of Shor\u2019s quantum factoring algorithm using nuclear magnetic resonance","volume":"414","author":"Vandersypen","year":"2001","journal-title":"Nature"},{"key":"ref_13","unstructured":"D-Wave Quantum Inc. (2025, November 23). Performance Gains in the D-Wave Advantage2 System at the 4400-Qubit Scale. Available online: https:\/\/www.dwavequantum.com\/media\/wakjcpsf\/adv2_4400q_whitepaper-1.pdf."},{"key":"ref_14","unstructured":"IBM Quantum (2025, November 23). IBM Quantum Roadmap Through 2033: Advancing Toward Quantum-Centric Supercomputing. Available online: https:\/\/www.ibm.com\/quantum\/blog\/quantum-roadmap-2033."},{"key":"ref_15","unstructured":"IBM Quantum (2025, February 15). Qiskit. Available online: https:\/\/www.ibm.com\/quantum\/qiskit."},{"key":"ref_16","unstructured":"Javadi-Abhari, A., Treinish, M., Krsulich, K., Wood, C.J., Lishman, J., Gacon, J., Martiel, S., Nation, P.D., Bishop, L.S., and Cross, A.W. (2024). Quantum Computing with Qiskit. arXiv."},{"key":"ref_17","unstructured":"National Institute of Standards and Technology (NIST) (2026, January 22). Post-Quantum Cryptography Standardization Process: Call for Proposals, Available online: https:\/\/csrc.nist.gov\/csrc\/media\/projects\/post-quantum-cryptography\/documents\/call-for-proposals-final-dec-2016.pdf."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Barker, E., Chen, L., Keller, S., Roginsky, A., Vassilev, A., and Davis, R. (2017). Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, Technical Report.","DOI":"10.6028\/NIST.SP.800-56Ar3"},{"key":"ref_19","unstructured":"National Institute of Standards and Technology (2025, December 12). Digital Signature Standard (DSS), Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/fips\/nist.fips.186-4.pdf."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Kelsey, J., Liu, Y.K., Miller, C., Moody, D., and Peralta, R. (2020). Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process.","DOI":"10.6028\/NIST.IR.8240"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Beullens, W. (2022). Breaking rainbow takes a weekend on a laptop. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 15\u201318 August 2022, Springer.","DOI":"10.1007\/978-3-031-15979-4_16"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Castryck, W., and Decru, T. (2023). An efficient key recovery attack on SIDH. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, 23\u201327 April 2023, Springer.","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"ref_23","unstructured":"NIST (2025, November 23). Online PQC Conference, Available online: https:\/\/www.nist.gov\/news-events\/events\/2022\/11\/fourth-pqc-standardization-conference."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Alagic, G., Bros, M., Ciadoux, P., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.-K., and Miller, C. (2025, November 24). Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process. NIST Interagency\/Internal Report (IR 8545), Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2025\/NIST.IR.8545.pdf.","DOI":"10.6028\/NIST.IR.8545"},{"key":"ref_25","first-page":"31","article-title":"Predicting Lattice Reduction","volume":"Volume 4965","author":"Smart","year":"2008","journal-title":"Advances in Cryptology\u2013EUROCRYPT 2008, Istanbul, Turkey, 13\u201317 April 2008"},{"key":"ref_26","unstructured":"Albrecht, M.R., Player, R., and Scott, S. (2025, November 28). On the Concrete Hardness of Learning with Errors. Cryptology ePrint Archive, Report 2015\/046. Available online: https:\/\/eprint.iacr.org\/2015\/046.pdf."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","article-title":"Worst-case to average-case reductions for module lattices","volume":"75","author":"Langlois","year":"2015","journal-title":"Des. Codes Cryptogr."},{"key":"ref_28","first-page":"282","article-title":"Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM","volume":"Volume 10831","author":"Joux","year":"2018","journal-title":"Progress in Cryptology\u2013AFRICACRYPT 2018, Marrakesh, Morocco, 7\u20139 May 2018"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1561\/0400000074","article-title":"A Decade of Lattice Cryptography","volume":"10","author":"Peikert","year":"2016","journal-title":"Found. Trends\u00ae Theor. Comput. Sci."},{"key":"ref_30","first-page":"103","article-title":"On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL","volume":"Volume 10211","author":"Coron","year":"2017","journal-title":"Advances in Cryptology\u2013EUROCRYPT 2017, Paris, France, 30 April\u2013 4 May 2017"},{"key":"ref_31","first-page":"70","article-title":"Efficient key recovery for all HFE signature variants","volume":"Volume 12825","author":"Malkin","year":"2021","journal-title":"Advances in Cryptology\u2013CRYPTO 2021, Virtual Event, 16\u201320 August 2021"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"130","DOI":"10.46586\/tosc.v2020.i4.130-146","article-title":"Cryptanalysis of LowMC instances using single plaintext\/ciphertext pair","volume":"2020","author":"Banik","year":"2020","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"ref_33","first-page":"388","article-title":"Differential power analysis","volume":"Volume 1666","author":"Wiener","year":"1999","journal-title":"Advances in Cryptology\u2013CRYPTO 1999, Santa Barbara, CA, USA, 15\u201319 August 1999"},{"key":"ref_34","first-page":"13","article-title":"Template attacks","volume":"Volume 2523","author":"Chari","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2002, San Francisco Bay, CA, USA, 13\u201315 August 2002"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-49445-6_1","article-title":"Breaking Cryptographic Implementations Using Deep Learning Techniques","volume":"Volume 10076","author":"Cadet","year":"2016","journal-title":"Security, Privacy, and Applied Cryptography Engineering"},{"key":"ref_36","unstructured":"Karlov, A., and Linard de Guertechin, N. (2025, December 14). Power Analysis Attack on Kyber. Cryptology ePrint Archive, Report 2021\/1311. Available online: https:\/\/eprint.iacr.org\/2021\/1311."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/3569420","article-title":"Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication","volume":"23","author":"Mujdei","year":"2024","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"5025","DOI":"10.1109\/TCSI.2023.3288600","article-title":"Side channel security oriented evaluation and protection on hardware implementations of Kyber","volume":"70","author":"Zhao","year":"2023","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_39","first-page":"537","article-title":"Secure integration of asymmetric and symmetric encryption schemes","volume":"Volume 1666","author":"Wiener","year":"1999","journal-title":"Advances in Cryptology\u2013CRYPTO \u201999, Santa Barbara, CA, USA, 15\u201319 August 1999"},{"key":"ref_40","first-page":"359","article-title":"A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM","volume":"Volume 12171","author":"Guo","year":"2020","journal-title":"Advances in Cryptology\u2013CRYPTO 2020, Online, 17\u201321 August 2020"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Ravi, P., Sinha Roy, S., Chattopadhyay, A., and Bhasin, S. (2020). Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst., 307\u2013335.","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ueno, R., Xagawa, K., Tanaka, Y., Ito, A., Takahashi, J., and Homma, N. (2022). Curse of re-encryption: A generic power\/EM analysis on post-quantum KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst., 296\u2013322.","DOI":"10.46586\/tches.v2022.i1.296-322"},{"key":"ref_43","first-page":"513","article-title":"Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption","volume":"Volume 10529","author":"Fischer","year":"2017","journal-title":"Cryptographic Hardware and Embedded Systems\u2013CHES 2017, Taipei, Taiwan, 25\u201328 September 2017"},{"key":"ref_44","first-page":"130","article-title":"More practical single-trace attacks on the Number Theoretic Transform","volume":"Volume 11774","author":"Schwabe","year":"2019","journal-title":"Progress in Cryptology\u2013LATINCRYPT 2019, Santiago, Chile, 2\u20134 October 2019"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Chen, Z., Karabulut, E., Aysu, A., Ma, Y., and Jing, J. (2021, January 24\u201327). An efficient non-profiled side-channel attack on the CRYSTALS-Dilithium post-quantum signature. Proceedings of the IEEE 39th International Conference on Computer Design (ICCD), Storrs, CT, USA.","DOI":"10.1109\/ICCD53106.2021.00094"},{"key":"ref_46","unstructured":"Kim, I., Lee, T., Han, J., Sim, B.-Y., and Han, D.G. (2025, December 10). Novel Single-Trace ML Profiling Attacks on NIST 3 Round Candidate Dilithium. Available online: https:\/\/eprint.iacr.org\/2020\/1383."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1186\/s42400-024-00209-9","article-title":"In-depth correlation power analysis attacks on a hardware implementation of CRYSTALS-Dilithium","volume":"7","author":"Wang","year":"2024","journal-title":"Cybersecurity"},{"key":"ref_48","first-page":"329","article-title":"LWE with side information: Attacks and concrete security estimation","volume":"Volume 12171","author":"Micciancio","year":"2020","journal-title":"Advances in Cryptology\u2013CRYPTO 2020, Online, 17\u201321 August 2020"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Ravi, P., Jhanwar, M.P., Howe, J., Chattopadhyay, A., and Bhasin, S. (2019, January 9\u201312). Exploiting determinism in lattice-based signatures. Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (ASIACCS), Auckland, New Zealand.","DOI":"10.1145\/3321705.3329821"},{"key":"ref_50","first-page":"159","article-title":"Differential power analysis of XMSS and SPHINCS","volume":"Volume 11002","author":"Fan","year":"2018","journal-title":"Constructive Side-Channel Analysis and Secure Design\u20139th International Workshop, COSADE 2018, Singapore, 23\u201324 April 2018"},{"key":"ref_51","unstructured":"Basu, K., Soni, D., Nabeel, M., and Karri, R. (2025, December 10). NIST Post-Quantum Cryptography\u2014A Hardware Evaluation Study. Cryptology ePrint Archive, Paper 2019\/047. Available online: https:\/\/eprint.iacr.org\/2019\/047."},{"key":"ref_52","first-page":"424","article-title":"Security comparisons and performance analyses of post-quantum signature algorithms","volume":"Volume 12727","author":"Sako","year":"2021","journal-title":"Applied Cryptography and Network Security\u2013ACNS 2021, Kamakura, Kanagawa, Japan, 21\u201324 June 2021"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Raavi, M., Khan, Q., Wuthier, S., Chandramouli, P., Balytskyi, Y., and Chang, S.-Y. (2025). Security and performance analyses of post-quantum digital signature algorithms and their TLS and PKI integrations. Cryptography, 9.","DOI":"10.3390\/cryptography9020038"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Hines, K., Raavi, M., Villeneuve, J.-M., Wuthier, S., Moreno-Colin, J., and Bai, Y. (2022). Post-Quantum cipher power analysis in lightweight devices. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC \u201922), San Antonio, TX, USA, 16\u201319 May 2022, ACM Press.","DOI":"10.1145\/3507657.3529652"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1007\/s42452-025-07201-z","article-title":"Efficient implementation of post-quantum digital signatures on Raspberry Pi","volume":"7","author":"Ghadban","year":"2025","journal-title":"Discov. Appl. Sci."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"8791","DOI":"10.1109\/ACCESS.2024.3350775","article-title":"Evaluation of Performance, Energy, and Computation Costs of Quantum-Attack Resilient Encryption Algorithms for Embedded Devices","volume":"12","author":"Halak","year":"2024","journal-title":"IEEE Access"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"El Mrabet, N., De Feo, L., and Duquesne, S. (2023). Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7. Proceedings of the Progress in Cryptology-AFRICACRYPT 2023, Sousse, Tunisia, 19\u201321 July 2023, Springer.","DOI":"10.1007\/978-3-031-37679-5"},{"key":"ref_58","unstructured":"Kannwischer, M.J., Rijneveld, J., Schwabe, P., and Stoffelen, K. (2025, December 10). pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. Available online: https:\/\/repository.ubn.ru.nl\/bitstream\/handle\/2066\/210214\/210214.pdf."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.icte.2024.11.002","article-title":"Optimized Falcon Verify on Cortex-M4 for Post-Quantum secure UAV communications","volume":"11","author":"Choi","year":"2025","journal-title":"ICT Express"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"328","DOI":"10.46586\/tches.v2021.i2.328-356","article-title":"A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA","volume":"2021","author":"Xing","year":"2021","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Yaman, F., Mert, A.C., \u00d6zt\u00fcrk, E., and Sava\u015f, E. (2021, January 1\u20135). A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme. Proceedings of the 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France.","DOI":"10.23919\/DATE51398.2021.9474139"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., and Mozaffari-Kermani, M. (2021). A monolithic hardware implementation of Kyber: Comparing apples to apples in PQC candidates. Proceedings of the International Conference on Cryptology and Information Security in Latin America, Bogot\u00e1, Colombia, 6\u20138 October 2021, Springer.","DOI":"10.1007\/978-3-030-88238-9_6"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/TCSI.2022.3219555","article-title":"KaLi: A Crystal for Post-Quantum Security Using Kyber and Dilithium","volume":"70","author":"Aikata","year":"2023","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MDAT.2023.3305156","article-title":"Hardware Accelerators for Digital Signature Algorithms Dilithium and FALCON","volume":"41","author":"Beckwith","year":"2024","journal-title":"IEEE Des. Test"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"25501","DOI":"10.1109\/ACCESS.2024.3367109","article-title":"CRYPHTOR: A Memory-Unified NTT-Based Hardware Accelerator for Post-Quantum CRYSTALS Algorithms","volume":"12","author":"Matteo","year":"2024","journal-title":"IEEE Access"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Beckwith, L., Nguyen, D.T., and Gaj, K. (2021, January 6\u201310). High-Performance Hardware Implementation of CRYSTALS-Dilithium. Proceedings of the 2021 International Conference on Field-Programmable Technology (ICFPT), Auckland, New Zealand.","DOI":"10.1109\/ICFPT52863.2021.9609917"},{"key":"ref_67","unstructured":"Grosso, V., and P\u00f6ppelmann, T. (2022). A Hard Crystal\u2014Implementing Dilithium on Reconfigurable Hardware. Proceedings of the Smart Card Research and Advanced Applications, Birmingham, UK, 7\u20139 November 2022, Springer."},{"key":"ref_68","unstructured":"Zhu, T., and Li, Y. (2024). An Efficient Hardware Implementation of Crystal-Dilithium on FPGA. Proceedings of the Information Security and Privacy, Sydney, NSW, Australia, 15\u201317 July 2024, Springer."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"57947","DOI":"10.1109\/ACCESS.2024.3387489","article-title":"An Efficient Hardware\/Software Co-Design for FALCON on Low-End Embedded Systems","volume":"12","author":"Lee","year":"2024","journal-title":"IEEE Access"},{"key":"ref_70","unstructured":"Schmid, M., Amiet, D., Wendler, J., Zbinden, P., and Wei, T. (2025, October 21). Falcon Takes Off\u2014A Hardware Implementation of the Falcon Signature Scheme. Publication Info: Preprint. Available online: https:\/\/eprint.iacr.org\/2023\/1885.pdf."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1109\/TETC.2024.3407124","article-title":"Area and Power Efficient FFT\/IFFT Processor for FALCON Post-Quantum Cryptography","volume":"13","author":"Alsuhli","year":"2024","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"203","DOI":"10.46586\/tches.v2025.i1.203-226","article-title":"FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation","volume":"2025","author":"Ouyang","year":"2025","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Dai, Y., Song, Y., Tian, J., and Wang, Z. (2023, January 5\u20137). High-Throughput Hardware Implementation for Haraka in SPHINCS+. Proceedings of the 2023 24th International Symposium on Quality Electronic Design (ISQED), San Francisco, CA, USA.","DOI":"10.1109\/ISQED57927.2023.10129310"},{"key":"ref_74","unstructured":"Wacquez, R., and Homma, N. (2024). The Impact of Hash Primitives and Communication Overhead for Hardware-Accelerated SPHINCS+. Proceedings of the Constructive Side-Channel Analysis and Secure Design, Gardanne, France, 9\u201310 April 2024, Springer."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Amiet, D., Leuenberger, L., Curiger, A., and Zbinden, P. (2020, January 26\u201328). FPGA-based SPHINCS+ Implementations: Mind the Glitch. Proceedings of the 2020 23rd Euromicro Conference on Digital System Design (DSD), Kranj, Slovenia.","DOI":"10.1109\/DSD51259.2020.00046"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Berthet, Q., Upegui, A., Gantel, L., Duc, A., and Traverso, G. (2021, January 17\u201321). An Area-Efficient SPHINCS+ Post-Quantum Signature Coprocessor. Proceedings of the 2021 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Portland, OR, USA.","DOI":"10.1109\/IPDPSW52791.2021.00034"},{"key":"ref_77","first-page":"54","article-title":"Design and Implementation of Hardware-Software Architecture Based on Hashes for SPHINCS+","volume":"17","author":"Cumplido","year":"2024","journal-title":"ACM Trans. Reconfigurable Technol. Syst."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s13389-022-00288-9","article-title":"Post-quantum hybrid key exchange: A systematic mapping study","volume":"13","author":"Giron","year":"2023","journal-title":"J. Cryptogr. Eng."},{"key":"ref_79","unstructured":"Crockett, E., Paquin, C., and Stebila, D. (2019, January 22\u201324). Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. Proceedings of the Second NIST PQC Standardization Conference, Santa Barbara, CA, USA."},{"key":"ref_80","first-page":"206","article-title":"Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange","volume":"Volume 11505","author":"Bindel","year":"2019","journal-title":"Proceedings of the Post-Quantum Cryptography (PQCrypto 2019), Chongqing, China, 8\u201310 May 2019"},{"key":"ref_81","first-page":"480","article-title":"Hybrid Post-quantum Signatures in Hardware Security Keys","volume":"Volume 13907","author":"Ghinea","year":"2023","journal-title":"Proceedings of the Applied Cryptography and Network Security Workshops (ACNS 2023), Kyoto, Japan, 19\u201322 June 2023"},{"key":"ref_82","unstructured":"Devevey, J., Guerreau, M., and Rom\u00e9as, M. (2025, November 13). Compact, Efficient and Non-Separable Hybrid Signatures. Cryptology ePrint Archive, Paper 2025\/2059. Available online: https:\/\/eprint.iacr.org\/2025\/2059.pdf."},{"key":"ref_83","unstructured":"Microsoft (2026, January 22). Post-Quantum Cryptography APIs Now Generally Available on Microsoft Platforms. Available online: https:\/\/techcommunity.microsoft.com\/blog\/microsoft-security-blog\/post-quantum-cryptography-apis-now-generally-available-on-microsoft-platforms\/4469093."},{"key":"ref_84","unstructured":"Google Cloud (2026, January 22). Announcing Quantum-Safe Key Encapsulation Mechanisms in Cloud KMS. Available online: https:\/\/cloud.google.com\/blog\/products\/identity-security\/announcing-quantum-safe-key-encapsulation-mechanisms-in-cloud-kms."},{"key":"ref_85","unstructured":"Amazon Web Services (2026, January 22). ML-KEM Post-Quantum TLS Now Supported in AWS KMS, ACM, and Secrets Manager. Available online: https:\/\/aws.amazon.com\/blogs\/security\/ml-kem-post-quantum-tls-now-supported-in-aws-kms-acm-and-secrets-manager\/."},{"key":"ref_86","first-page":"3","article-title":"Standardisation of and Migration to Post-Quantum Cryptography","volume":"Volume 15559","author":"Chen","year":"2025","journal-title":"Proceedings of the Security Standardisation Research (SSR 2024), Kunming, China, 16 December 2024"},{"key":"ref_87","first-page":"362","article-title":"Post-quantum Cryptography in Practice: A Survey of Algorithms, Applications, and Deployment Challenges","volume":"Volume 1456","author":"Pereira","year":"2025","journal-title":"Proceedings of the International Workshop on Advanced Information Security Management and Applications (AISMA 2025), Stavropol, Russia, 15\u201319 May 2025"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Sadeghi, A.R., Schulz, S., and Wachsmann, C. (2013). A Security Framework for the Analysis and Design of Software Attestation. Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, Berlin, Germany, 4\u20138 November 2013, Association for Computing Machinery.","DOI":"10.1145\/2508859.2516650"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Francillon, A., Perito, D., and Soriente, C. (2009). On the Difficulty of Software-Based Attestation of Embedded Devices. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago IL, USA, 9\u201313 November 2009, Association for Computing Machinery.","DOI":"10.1145\/1653662.1653711"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Perrig, A., van Doorn, L., and Khosla, P. (2006). SCUBA: Secure Code Update By Attestation in sensor networks. Proceedings of the 5th ACM Workshop on Wireless Security, Los Angeles CA, 29 September 2006, Association for Computing Machinery.","DOI":"10.1145\/1161289.1161306"},{"key":"ref_91","unstructured":"Shi, E., Perrig, A., and Van Doorn, L. (2005, January 8\u201311). BIND: A fine-grained attestation service for secure distributed systems. Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P\u201905), Oakland, CA, USA."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Lew, K., Sarker, A., Wuthier, S., Kim, J., Kim, J., and Chang, S.Y. (2024). Distributed Software Build Assurance for Software Supply Chain Integrity. Appl. Sci., 14.","DOI":"10.3390\/app14209262"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Sarker, A., Wuthier, S., Kim, J., Kim, J., and Chang, S.Y. (2023). Version++ Protocol Demonstration for Cryptocurrency Blockchain Handshaking with Software Assurance. Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8\u201311 January 2023, IEEE.","DOI":"10.1109\/CCNC51644.2023.10059971"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Yu, S., Song, W., Hu, X., and Yin, H. (2024, January 24\u201327). On the Correctness of Metadata-Based SBOM Generation: A Differential Analysis Approach. Proceedings of the 2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Brisbane, Australia.","DOI":"10.1109\/DSN58291.2024.00018"},{"key":"ref_95","unstructured":"Mirakhorli, M., Garcia, D., Dillon, S., Laporte, K., Morrison, M., Lu, H., Koscinski, V., and Enoch, C. (2024). A Landscape Study of Open Source and Proprietary Tools for Software Bill of Materials (SBOM). arXiv."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New Directions in Cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Grassi, P.A., Garcia, M.E., and Fenton, J.L. (2017). Digital Identity Guidelines, Technical Report 800-63-3.","DOI":"10.6028\/NIST.SP.800-63-3"},{"key":"ref_98","unstructured":"ITU-T (2025, November 30). Recommendation X.509: Information Technology\u2014Open Systems Interconnection\u2014The Directory: Public-Key and Attribute Certificate Frameworks. Available online: https:\/\/www.itu.int\/rec\/t-rec-x.509."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., and Polk, T. (2025, December 20). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. Available online: https:\/\/doi.org\/10.17487\/RFC5280.","DOI":"10.17487\/rfc5280"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., and Devetsikiotis, M. (2020, January 23\u201326). Post-Quantum Authentication in TLS 1.3: A Performance Study. Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2020.24203"},{"key":"ref_101","unstructured":"Kampanakis, P., Panburana, P., Daw, E., and Van Geest, D. (2025, December 20). The Viability of Post-Quantum X. 509 Certificates. Cryptology ePrint Archive. Available online: https:\/\/eprint.iacr.org\/2018\/063.pdf."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Raavi, M., Chandramouli, P., Wuthier, S., Zhou, X., and Chang, S.Y. (2021). Performance characterization of post-quantum digital certificates. Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 19\u201322 July 2021, IEEE.","DOI":"10.1109\/ICCCN52240.2021.9522179"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Chen, A.C. (2024). Post-Quantum Cryptography X. 509 Certificate. Proceedings of the 2024 International Conference on Smart Systems for applications in Electrical Sciences (ICSSES), Tumakuru, India, 3\u20134 May 2024, IEEE.","DOI":"10.1109\/ICSSES62373.2024.10561274"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"D\u2019Onghia, G., Berbecaru, D.G., and Lioy, A. (2024). Shaping a Quantum-Resistant Future: Strategies for Post-Quantum PKI. Proceedings of the 2024 IEEE Symposium on Computers and Communications (ISCC), Paris, France, 26\u201329 June 2024, IEEE.","DOI":"10.1109\/ISCC61673.2024.10733624"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"B\u00fcrstinghaus-Steinbach, K., Krau\u00df, C., Niederhagen, R., and Schneider, M. (2020). Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS. ASIA CCS \u201920: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, 5\u20139 October 2020, Association for Computing Machinery.","DOI":"10.1145\/3320269.3384725"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Raavi, M., Wuthier, S., Chandramouli, P., Zhou, X., and Chang, S.Y. (2022). QUIC Protocol with Post-quantum Authentication. Proceedings of the Information Security, Belgrade, Serbia, 2 December 2022, Springer.","DOI":"10.1007\/978-3-031-22390-7_6"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Kempf, M., Gauder, N., Jaeger, B., Zirngibl, J., and Carle, G. (2024, January 3\u20136). A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights. Proceedings of the 2024 IFIP Networking Conference (IFIP Networking), Thessaloniki, Greece.","DOI":"10.23919\/IFIPNetworking62109.2024.10619916"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Raavi, M., Wuthier, S., Zhou, X., and Chang, S.Y. (2023). Post-Quantum QUIC Protocol in Cloud Networking. Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), Gothenburg, Sweden, 6\u20139 June 2023, IEEE.","DOI":"10.1109\/EuCNC\/6GSummit58263.2023.10188358"},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/3431832.3431838","article-title":"Retrofitting post-quantum cryptography in internet protocols: A case study of DNSSEC","volume":"50","author":"Overeinder","year":"2020","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Raavi, M., Wuthier, S., and Chang, S. (2024, January 9\u201313). Securing Post-Quantum DNSSEC Against Fragmentation Mis-Association Threat. Proceedings of the ICC 2024-IEEE International Conference on Communications, Denver, CO, USA.","DOI":"10.1109\/ICC51166.2024.10622607"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Johansson, T., and Smith-Tone, D. (2023). Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation. Proceedings of the Post-Quantum Cryptography, College Park, MD, USA, 16\u201318 August 2023, Springer.","DOI":"10.1007\/978-3-031-40003-2"},{"key":"ref_112","unstructured":"Lee, J., Hoque, S., Aydeger, A., and Zeydan, E. (2025). Quantum-Resistant Domain Name System: A Comprehensive System-Level Study. arXiv."},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Pazienza, A., Lella, E., Noviello, P., and Vitulano, F. (2022, January 6\u20139). Analysis of Network-level Key Exchange Protocols in the Post-Quantum Era. Proceedings of the 2022 IEEE 15th Workshop on Low Temperature Electronics (WOLTE), Matera, Italy.","DOI":"10.1109\/WOLTE55422.2022.9882818"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Herzinger, D., Gazdag, S.L., and Loebenberger, D. (2021, January 15\u201317). Real-World Quantum-Resistant IPsec. Proceedings of the 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh, UK.","DOI":"10.1109\/SIN54109.2021.9699255"},{"key":"ref_115","doi-asserted-by":"crossref","unstructured":"Damir, M.T., Meskanen, T., Ramezanian, S., and Niemi, V. (2022). A beyond-5g authentication and key agreement protocol. Proceedings of the International Conference on Network and System Security, Denarau Island, Fiji, 9\u201312 December 2022, Springer.","DOI":"10.1007\/978-3-031-23020-2_14"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Ulitzsch, V.Q., Park, S., Marzougui, S., and Seifert, J.P. (2022, January 16\u201319). A post-quantum secure subscription concealed identifier for 6g. Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA.","DOI":"10.1145\/3507657.3528540"},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Khan, Q., and Chang, S.Y. (2025). Post-Quantum Key Exchange and ID Encryption Analyses for 5G Mobile Networking. Proceedings of the NOMS 2025-2025 IEEE Network Operations and Management Symposium, Honolulu, HI, USA, 12\u201316 May 2025, IEEE.","DOI":"10.1109\/NOMS57970.2025.11073683"},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Khan, Q., and Chang, S.Y. (2025). Post-Quantum Key Exchange and Subscriber Identity Encryption in 5G Using ML-KEM (Kyber)\u2020. Information, 16.","DOI":"10.3390\/info16070617"},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Khan, Q., Purification, S., Cheruiyot, R., Kim, J., Kim, I., and Chang, S.Y. (2025, January 23\u201325). Post-Quantum Digital Signature and Authentication for eSIM in 5G Mobile Networking. Proceedings of the IEEE Silicon Valley Cybersecurity Conference (SVCC), San Francisco, CA, USA.","DOI":"10.1109\/SVCC65277.2025.11133633"},{"key":"ref_120","unstructured":"Bettale, L., Dottax, E., and Gr\u00e9my, L. (2025, December 20). Post-Quantum Secure Channel Protocols for eSIMs; Paper 2024\/2005; Cryptology ePrint Archive. Available online: https:\/\/www.scitepress.org\/Link.aspx?doi=10.5220\/0013507200003979."},{"key":"ref_121","unstructured":"Micciancio, D., and Regev, O. (2021). Lattice-based Cryptography. Post-Quantum Cryptography, Springer."},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-030-64837-4_10","article-title":"Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications","volume":"Volume 12491","author":"Katsumata","year":"2020","journal-title":"Proceedings of the Advances in Cryptology\u2013ASIACRYPT 2020, Part I"},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"3181","DOI":"10.1007\/s10623-025-01640-w","article-title":"Lattice Codes for CRYSTALS-Kyber","volume":"93","author":"Liu","year":"2025","journal-title":"Des. Codes Cryptogr."},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Schwabe, P., Stebila, D., and Wiggers, T. (2020). Post-Quantum TLS Without Handshake Signatures. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), Virtual, 9\u201313 November 2020, ACM.","DOI":"10.1145\/3372297.3423350"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Bertino, E., Shulman, H., and Waidner, M. (2021). More efficient post-quantum KEMTLS with pre-distributed public keys. Proceedings of the Computer Security\u2013ESORICS 2021, Darmstadt, Germany, 4\u20138 October 2021, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-030-88428-4"},{"key":"ref_126","first-page":"88","article-title":"Implementing and Measuring KEMTLS","volume":"Volume 12912","author":"Celi","year":"2021","journal-title":"Proceedings of the Progress in Cryptology\u2013LATINCRYPT 2021, Bogota, Colombia, 6\u20138 October 2021"},{"key":"ref_127","first-page":"99","article-title":"KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems","volume":"Volume 13783","author":"Gonzalez","year":"2022","journal-title":"Proceedings of the Security, Privacy, and Applied Cryptography Engineering (SPACE 2022), Jaipur, India, 9\u201312 December 2022"},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Rawat, A.S., and Jhanwar, M.P. (2025). Quantum-safe Signatureless DNSSEC. ASIA CCS \u201925: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, Hanoi, Vietnam, 25\u201329 August 2025, ACM.","DOI":"10.1145\/3708821.3710837"},{"key":"ref_129","unstructured":"Gilad, Y., and Herzberg, A. (2011, January 8\u20139). Fragmentation considered vulnerable: Blindly intercepting and discarding fragments. Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT 11), San Francisco, CA, USA."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/1\/12\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T16:10:54Z","timestamp":1770912654000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/10\/1\/12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":129,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["cryptography10010012"],"URL":"https:\/\/doi.org\/10.3390\/cryptography10010012","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]}}}