Aim and Scope

The Journal of Post-Quantum Cryptography and Systems is dedicated to publishing high-quality scholarly research addressing the challenges and advancements associated with cryptographic security in the era of quantum computing. As rapid developments in quantum technologies pose potential threats to traditional cryptographic algorithms, the journal seeks to provide an academic platform for research that contributes to the development, evaluation, and practical implementation of quantum-resistant security solutions.

The journal places strong emphasis on research that extends beyond purely theoretical discussion and demonstrates rigorous analysis, methodological soundness, and practical relevance. Contributions that explore the design, implementation, and evaluation of secure cryptographic systems are particularly encouraged. By supporting both theoretical innovation and applied research, the journal aims to facilitate the development of reliable and scalable cryptographic technologies capable of securing modern digital infrastructures.

Through interdisciplinary collaboration between researchers, engineers, and security practitioners, the journal seeks to promote a deeper understanding of emerging cryptographic threats and the development of effective strategies to mitigate them in real-world environments.

What the Journal Aims to Achieve

The Journal of Post-Quantum Cryptography and Systems strives to serve as a trusted scholarly forum that advances knowledge and innovation within the field of cryptographic security. In particular, the journal aims to:

  • Promote original research that contributes to the advancement of quantum-safe cryptographic methods and secure communication technologies.

  • Encourage interdisciplinary research that bridges mathematical cryptography with practical system implementation and engineering applications.

  • Support studies that evaluate cryptographic algorithms and systems within realistic operational environments and practical deployment scenarios.

  • Foster critical examination of emerging security threats, vulnerabilities, and resilience strategies relevant to post-quantum computing contexts.

  • Provide an inclusive and reliable platform for academic scholars, industry experts, and practitioners to disseminate research findings and innovative solutions.

Scope of Topics

The journal welcomes original research articles, review papers, technical reports, and case studies that address a broad range of topics within the domains of cryptography, cybersecurity, and secure computing systems. Areas of interest include, but are not limited to the following:

Post-Quantum Cryptographic Algorithms

  • Design, development, and analysis of cryptographic primitives resistant to quantum attacks.

  • Lattice-based, code-based, hash-based, and multivariate cryptographic constructions.

  • Security proofs, algorithmic efficiency, and comparative studies of quantum-safe cryptographic techniques.

Secure System Design and Architecture

  • Architectural frameworks for integrating post-quantum cryptographic algorithms into software and hardware systems.

  • Design methodologies for secure computing infrastructures and distributed cryptographic systems.

  • Applications involving embedded systems, secure processors, and trusted hardware platforms.

Performance Evaluation and Implementation

  • Benchmarking and efficiency evaluation of cryptographic implementations.

  • Experimental studies examining computational overhead, scalability, and system performance.

  • Comparative performance analysis of classical and post-quantum cryptographic approaches.

Threat Modeling and Cryptanalysis

  • Identification and analysis of vulnerabilities in cryptographic protocols and implementations.

  • Side-channel attacks, fault attacks, and corresponding mitigation techniques.

  • Evaluation of cryptographic resilience under both classical and quantum adversarial models.

Policy, Standards, and Deployment

  • International cryptographic standardization initiatives and frameworks.

  • Strategies for migration toward quantum-safe security infrastructures.

  • Policy considerations, regulatory requirements, and compliance perspectives for cryptographic technologies.

Intended Audience and Contributors

The journal welcomes submissions from a diverse community of researchers and professionals engaged in cryptography and secure system development. The intended audience includes:

  • Academic researchers specializing in cryptography, cybersecurity, and information security.

  • System engineers and security architects responsible for designing secure computing infrastructures.

  • Graduate students and early-career scholars conducting research in cryptographic technologies.

  • Industry practitioners and technology developers implementing secure systems and cryptographic solutions.

  • Security analysts and policy experts engaged in preparing organizations for post-quantum security challenges.

The journal values contributions that make meaningful and impactful advances in the field. These may include novel theoretical developments, critical evaluations of existing cryptographic methods, experimental studies demonstrating practical system performance, or interdisciplinary research exploring the broader implications of post-quantum security technologies.

By encouraging rigorous scholarship and practical innovation, the journal seeks to contribute to the global effort of developing secure and resilient digital systems capable of withstanding future technological challenges.