8 results · ● Live web index
labs.apnic.net news

Post-Quantum Cryptography | blabs - APNIC Labs

https://labs.apnic.net/index.php/post-quantum-cryptography/

“Post-Quantum Cryptography” is conventional cryptography using algorithms and key sizes and applications running on today's processors to generate cryptographic

Visit
nxp.com news

Post-Quantum Cryptography | NXP Semiconductors

https://www.nxp.com/applications/technologies/security/post-quantum-cryptogra…

Post-quantum cryptography algorithms like Crystals-Kyber, Crystals-Dilithium, Sphincs+ and Falcon can run on classical computer hardware found in devices we use

Visit
rambus.com news

Post-quantum Cryptography (PQC): New Algorithms for a New Era

https://www.rambus.com/blogs/post-quantum-cryptography-pqc-new-algorithms-for…

# Post-quantum Cryptography (PQC): New Algorithms for a New Era. by Rambus Press Leave a Comment. [Updated April 14, 2025] Post-Quantum Cryptography (PQC), also known as Quantum Safe Cryptography (QSC), refers to cryptographic algorithms designed to withstand attacks by quantum computers. Leveraging Shor’s algorithm, quantum computers will be capable of reducing the security of discrete logarithm-based schemes like Elliptic Curve Cryptography (ECC) and factorization-based schemes like RSA (Rivest-Shamir-Adleman) so much that no reasonable key size would suffice to keep data secure. Post-Quantum Cryptography (PQC) refers to these cryptographic algorithms designed to withstand attacks by quantum computers. Rambus Quantum Safe IP solutions offer a hardware-level security solution to protect data and hardware against quantum computer attacks using NIST and CNSA selected algorithms. For many years, Rambus has been a leading voice in the PQC movement and now offers a portfolio of Quantum Safe IP solutions designed to offer hardware-level security using NIST and CNSA selected algorithms.

Visit
arxiv.org article

Applications of Post-quantum Cryptography

https://arxiv.org/abs/2406.13258

[Skip to main content](https://arxiv.org/abs/2406.13258#content). [![Image 1: Cornell University Logo](https://arxiv.org/static/browse/0.3.4/images/icons/cu/cornell-reduced-white-SMALL.svg)](https://www.cornell.edu/). [Help](https://info.arxiv.org/help) | [Advanced Search](https://arxiv.org/search/advanced). [![Image 4: Cornell University Logo](https://arxiv.org/static/browse/0.3.4/images/icons/cu/cornell-reduced-white-SMALL.svg)](https://www.cornell.edu/). * [Login](https://arxiv.org/login). * [Help Pages](https://info.arxiv.org/help). * [About](https://info.arxiv.org/about). [Submitted on 19 Jun 2024 ([v1](https://arxiv.org/abs/2406.13258v1)), last revised 17 Sep 2024 (this version, v3)]. [View PDF](https://arxiv.org/pdf/2406.13258). Cite as:[arXiv:2406.13258](https://arxiv.org/abs/2406.13258) [cs.CR]. (or [arXiv:2406.13258v3](https://arxiv.org/abs/2406.13258v3) [cs.CR] for this version). [https://doi.org/10.48550/arXiv.2406.13258](https://doi.org/10.48550/arXiv.2406.13258). From: Tuomo Sipola [[view email](https://arxiv.org/show-email/30b3cff4/2406.13258)]. **[[v1]](https://arxiv.org/abs/2406.13258v1)** Wed, 19 Jun 2024 06:45:39 UTC (339 KB). **[[v2]](https://arxiv.org/abs/2406.13258v2)** Mon, 24 Jun 2024 09:34:16 UTC (343 KB). [](https://arxiv.org/abs/2406.13258)Full-text links:. * [View PDF](https://arxiv.org/pdf/2406.13258). [![Image 5: license icon](https://arxiv.org/icons/licenses/by-4.0.png)view license](http://creativecommons.org/licenses/by/4.0/ "Rights to this article"). [cs](https://arxiv.org/abs/2406.13258?context=cs). [cs.ET](https://arxiv.org/abs/2406.13258?context=cs.ET). * [Semantic Scholar](https://api.semanticscholar.org/arXiv:2406.13258). Data provided by: [](https://arxiv.org/abs/2406.13258). [![Image 6: BibSonomy logo](https://arxiv.org/static/browse/0.3.4/images/icons/social/bibsonomy.png)](http://www.bibsonomy.org/BibtexHandler?requTask=upload&url=https://arxiv.org/abs/2406.13258&description=Applications%20of%20Post-quantum%20Cryptography "Bookmark on BibSonomy")[![Image 7: Reddit logo](https://arxiv.org/static/browse/0.3.4/images/icons/social/reddit.png)](https://reddit.com/submit?url=https://arxiv.org/abs/2406.13258&title=Applications%20of%20Post-quantum%20Cryptography "Bookmark on Reddit"). Bibliographic Explorer _([What is the Explorer?](https://info.arxiv.org/labs/showcase.html#arxiv-bibliographic-explorer))_. * [Author](https://arxiv.org/abs/2406.13258). * [Venue](https://arxiv.org/abs/2406.13258). * [Institution](https://arxiv.org/abs/2406.13258). * [Topic](https://arxiv.org/abs/2406.13258). [**Learn more about arXivLabs**](https://info.arxiv.org/labs/index.html). [Which authors of this paper are endorsers?](https://arxiv.org/auth/show-endorsers/2406.13258) | [Disable MathJax](javascript:setMathjaxCookie()) ([What is MathJax?](https://info.arxiv.org/help/mathjax.html)). * [About](https://info.arxiv.org/about). * [Help](https://info.arxiv.org/help). * [Contact](https://info.arxiv.org/help/contact.html). * [Subscribe](https://info.arxiv.org/help/subscribe). * [Copyright](https://info.arxiv.org/help/license/index.html). * [Privacy Policy](https://info.arxiv.org/help/policies/privacy_policy.html). * [Web Accessibility Assistance](https://info.arxiv.org/help/web_accessibility.html). * [arXiv Operational Status](https://status.arxiv.org/).

Visit
csrc.nist.gov official

Post-Quantum Cryptography | CSRC

https://csrc.nist.gov/projects/post-quantum-cryptography

NIST’s Post-Quantum Cryptography (PQC) project leads the national and global effort to secure electronic information against the future threat of quantum computers—machines that may be years or decades away but could eventually break many of today’s widely used cryptographic systems. Organizations should begin applying these standards now to migrate their systems to quantum-resistant cryptography. Alongside these standards, NIST conducts foundational cryptographic research; collaborates with industry and federal partners to guide organizations preparing for PQC migration; and administers the Cryptographic Module Validation Program to promote validated, trustworthy cryptography. In August 2024, NIST released its principal PQC standards (as Federal Information Processing Standards, or FIPS), specifying key establishment and digital signature schemes based on candidates evaluated and selected through this multi-year process. With the release of the first three final PQC standards, organizations should begin migrating their systems to quantum-resistant cryptography. In addition to the three algorithms specified in the initial FIPS standards, the Falcon digital signature algorithm and HQC key encapsulation mechanism were selected for ongoing standardization; that process is underway.

Visit
cloudflare.com news

What is post-quantum cryptography (PQC)? - Cloudflare

https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-cryptogr…

Post-quantum cryptography (PQC) refers to cryptographic algorithms that are secure against an attack by a quantum computer. Read more about PQC algorithms.

Visit
en.wikipedia.org article

Post-quantum cryptography - Wikipedia

https://en.wikipedia.org/wiki/Post-quantum_cryptography

| Random Linear Code based encryption[[59]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-59) | RLCE | 115 kB | 3 kB | |. The parameters for different security levels from 80 bits to 350 bits, along with the corresponding key sizes are provided in the paper.[[66]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-:10-66). The corresponding private key would be 6743 bits.[[54]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-:5-54). In order to get 128 bits of security for hash based signatures to sign 1 million messages using the fractal Merkle tree method of Naor Shenhav and Wool the public and private key sizes are roughly 36,000 bits in length.[[68]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-:7-68). Any authenticated public key encryption system can be used to build a key exchange with forward secrecy.[[73]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-73). As of March 2023, the following key exchange algorithms are supported:[[74]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-openquantumsafe.org-74). | BIKE[[79]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-79) | codes |. | McBits[[92]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-92) | Error-correcting codes |. * liboqs[[105]](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_note-105). **[^](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_ref-53)**National Institute of Standards and Technology (2024-08-13). **[^](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_ref-63)**Ding, Jintai; Xie, Xiang; Lin, Xiaodong (2012-01-01). **[^](https://en.wikipedia.org/wiki/Post-quantum_cryptography#cite_ref-:2_65-0)**Singh, Vikram (2015).

Visit
blog.gigamon.com news

Post-Quantum Cryptography: What It Is and How It Works - Gigamon Blog

https://blog.gigamon.com/2026/01/12/post-quantum-cryptography/

Unlike traditional encryption that relies on mathematical problems classical computers find difficult to solve, post-quantum cryptography uses algorithms designed to resist quantum computer attacks. Organizations must understand what the purpose of post-quantum cryptography is and how PQC optimizes security. Post-quantum cryptography relies on mathematical algorithms that fall into several families, each based on different computational challenges. Network visibility offered by the Gigamon Deep Observability Pipeline helps organizations monitor and secure communications while preparing for quantum-resistant implementations. 4. **Gradual deployment:** Organizations can implement hybrid cryptography during this phase, combining classical encryption with post-quantum algorithms. Companies like Gigamon understand the challenges organizations face in implementing quantum-resistant security while maintaining network performance and visibility. Post-quantum cryptography is a critical evolution in digital security, designed specifically to protect against the computational power of future quantum computers. Organizations must understand what the purpose of post-quantum cryptography is and begin their transition to quantum-resistant security now, well before “Q-Day” arrives and quantum computers gain the ability to break current encryption standards.

Visit