In the field of cryptography, quantum computing is expected to be able to successfully attack most of the currently used cryptographic algorithms, especially public-key designs, so the academic community has been working on quantum-resistant primitives and algorithms. However, practical computers that can be used for breaking highly secure systems are not expected to be available in the near term. This means that, in the next few years, pre-quantum and quantum algorithms will coexist, and in the meantime, new threats against existing security algorithms will appear, which affects deployments in contexts as different as blockchain technology, electronic voting or implantable medical devices.
Another consolidated trend in today's technology is IoT, i.e., the Internet of Things. Systems where computing devices are interrelated and can transfer data between themselves over a network are permeating all sectors of our society; thus, securing those devices is paramount. Given the limited resources available in some cases to IoT devices, cryptographic implementations in this context must be powerful but at the same time feasible, which provides a challenge for security designers.
This Special Issue welcomes theoretical and applied contributions that address cryptographic algorithms, technologies, and practices, especially those related to pre-quantum and post-quantum cryptography, IoT security, cryptographic protocols and implementations.