{"id":3166,"date":"2024-12-23T13:07:59","date_gmt":"2024-12-23T12:07:59","guid":{"rendered":"https:\/\/trustlab.upct.es\/2024\/12\/23\/train-or-bus-journey-which-one-suits\/"},"modified":"2025-09-18T22:09:58","modified_gmt":"2025-09-18T20:09:58","slug":"the-future-of-cybersecurity-exploring-post-quantum-cryptography","status":"publish","type":"post","link":"https:\/\/trustlab.upct.es\/en\/2024\/12\/23\/the-future-of-cybersecurity-exploring-post-quantum-cryptography\/","title":{"rendered":"The Future of Cybersecurity: Exploring Post-Quantum Cryptography"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3166\" class=\"elementor elementor-3166 elementor-1173\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63067bed e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"63067bed\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-799ad7ee elementor-widget elementor-widget-text-editor\" data-id=\"799ad7ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This article discusses how advances in quantum computing put current encryption systems at risk and proposes solutions based on post-quantum cryptography. It reviews quantum-resistant algorithms, such as CRYSTALS-Kyber and SPHINCS+, and highlights transition strategies for organizations, such as hybrid cryptography. This study is essential for preparing digital systems against future threats, combining theory, business perspective, and emerging NIST standards. DOI:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af6de6d e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"af6de6d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25130f8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"25130f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/doi.org\/10.3390\/technologies12120241\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View publication<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>This article discusses how advances in quantum computing put current encryption systems at risk and proposes solutions based on post-quantum cryptography. It reviews quantum-resistant algorithms, such as CRYSTALS-Kyber and SPHINCS+, and highlights transition strategies for organizations, such as hybrid cryptography. This study is essential for preparing digital systems against future threats, combining theory, business perspective, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2777,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[],"class_list":["post-3166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/comments?post=3166"}],"version-history":[{"count":4,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3166\/revisions"}],"predecessor-version":[{"id":3181,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3166\/revisions\/3181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media\/2777"}],"wp:attachment":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media?parent=3166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/categories?post=3166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/tags?post=3166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}