# Post-Quantum Cryptography ⎊ Term

**Published:** 2026-03-11
**Author:** Greeks.live
**Categories:** Term

---

![Two cylindrical shafts are depicted in cross-section, revealing internal, wavy structures connected by a central metal rod. The left structure features beige components, while the right features green ones, illustrating an intricate interlocking mechanism](https://term.greeks.live/wp-content/uploads/2025/12/dynamic-risk-mitigation-mechanism-illustrating-smart-contract-collateralization-and-volatility-hedging.webp)

![A high-tech stylized padlock, featuring a deep blue body and metallic shackle, symbolizes digital asset security and collateralization processes. A glowing green ring around the primary keyhole indicates an active state, representing a verified and secure protocol for asset access](https://term.greeks.live/wp-content/uploads/2025/12/advanced-collateralization-and-cryptographic-security-protocols-in-smart-contract-options-derivatives-trading.webp)

## Essence

**Post-Quantum Cryptography** represents the necessary transition of cryptographic primitives to algorithms resilient against attacks facilitated by large-scale quantum computers. Financial markets rely on the assumption that specific mathematical problems, such as integer factorization or discrete logarithms, remain computationally infeasible for classical hardware. Quantum systems, specifically those leveraging Shor’s algorithm, threaten to reduce the complexity of these operations from exponential to polynomial time, rendering existing public-key infrastructure obsolete. 

> Post-Quantum Cryptography secures decentralized financial assets by replacing vulnerable mathematical primitives with quantum-resistant alternatives.

The systemic relevance of this shift extends beyond mere security upgrades. It involves re-engineering the foundational trust layers of decentralized ledgers. If an adversary gains the ability to forge digital signatures, the integrity of transaction finality, account ownership, and consensus mechanisms dissolves instantly.

Implementing these safeguards requires a comprehensive migration strategy, balancing performance overhead with long-term security guarantees for high-value financial instruments.

![This high-resolution 3D render displays a cylindrical, segmented object, presenting a disassembled view of its complex internal components. The layers are composed of various materials and colors, including dark blue, dark grey, and light cream, with a central core highlighted by a glowing neon green ring](https://term.greeks.live/wp-content/uploads/2025/12/visualizing-complex-structured-products-in-defi-a-cross-chain-liquidity-and-options-protocol-stack.webp)

## Origin

The theoretical underpinnings of **Post-Quantum Cryptography** emerged from the intersection of quantum physics and computational complexity theory. While the development of quantum algorithms capable of breaking RSA and Elliptic Curve Cryptography predates the widespread adoption of blockchain, the urgency for adoption intensified as progress in qubit coherence and error correction accelerated. Academic research shifted toward lattice-based, hash-based, code-based, and multivariate-quadratic cryptographic constructions.

- **Lattice-based cryptography** relies on the hardness of problems like the Shortest Vector Problem, which remains intractable for both classical and quantum computers.

- **Hash-based signatures** utilize the security properties of collision-resistant cryptographic hash functions, providing a robust, albeit often performance-intensive, alternative.

- **Multivariate-quadratic equations** leverage the difficulty of solving systems of non-linear equations over finite fields, offering another layer of defense against quantum adversaries.

These developments reflect a proactive effort to preempt systemic collapse. Financial institutions and protocol developers recognized that data harvested today could be decrypted in the future, creating a retrospective vulnerability known as harvest-now-decrypt-later attacks.

![A minimalist, abstract design features a spherical, dark blue object recessed into a matching dark surface. A contrasting light beige band encircles the sphere, from which a bright neon green element flows out of a carefully designed slot](https://term.greeks.live/wp-content/uploads/2025/12/layered-smart-contract-architecture-visualizing-collateralized-debt-position-and-automated-yield-generation-flow-within-defi-protocol.webp)

## Theory

The architectural integrity of **Post-Quantum Cryptography** depends on mathematical structures that do not succumb to quantum parallelism. Unlike classical systems where security rests on the difficulty of reversing modular exponentiation, quantum-resistant frameworks shift the burden to geometric or algebraic complexity. 

| Algorithm Family | Primary Mathematical Assumption | Systemic Trade-off |
| --- | --- | --- |
| Lattice-based | Shortest Vector Problem | High efficiency, larger signature sizes |
| Hash-based | Collision resistance | High security, state management complexity |
| Multivariate | Polynomial system solving | Fast verification, large public keys |

> The transition to quantum-resistant primitives necessitates a fundamental re-evaluation of signature verification latency within decentralized settlement layers.

Adversarial environments dictate that these protocols must account for not only theoretical resilience but also implementation robustness. [Smart contract security](https://term.greeks.live/area/smart-contract-security/) requires that the chosen primitives minimize side-channel vulnerabilities while maintaining compatibility with existing virtual machine architectures. The trade-off between key size, signature length, and computational throughput determines the viability of these algorithms within resource-constrained blockchain environments.

![A highly stylized 3D rendered abstract design features a central object reminiscent of a mechanical component or vehicle, colored bright blue and vibrant green, nested within multiple concentric layers. These layers alternate in color, including dark navy blue, light green, and a pale cream shade, creating a sense of depth and encapsulation against a solid dark background](https://term.greeks.live/wp-content/uploads/2025/12/visualizing-multi-layered-collateralization-architecture-for-structured-derivatives-within-a-defi-protocol-ecosystem.webp)

## Approach

Current implementation strategies focus on cryptographic agility.

Developers integrate modular frameworks that allow for the seamless replacement of signing algorithms without requiring hard forks of the entire ledger. This requires careful management of gas costs, as many quantum-resistant signatures exceed the size of current Elliptic Curve Digital Signature Algorithm (ECDSA) signatures.

- **Signature aggregation** techniques are being refined to mitigate the impact of larger signature sizes on block space efficiency.

- **Hybrid schemes** combine classical and quantum-resistant algorithms to ensure that the system remains secure as long as at least one of the underlying assumptions holds.

- **Upgradeability paths** involve pre-deploying quantum-resistant public keys into smart contract accounts, enabling a phased transition for users.

Market participants must account for the reality that migration is a multi-year endeavor. Systemic risk arises not from the technology itself, but from the latency between the emergence of quantum capabilities and the completion of the protocol-wide cryptographic migration.

![A close-up view shows a dark blue mechanical component interlocking with a light-colored rail structure. A neon green ring facilitates the connection point, with parallel green lines extending from the dark blue part against a dark background](https://term.greeks.live/wp-content/uploads/2025/12/on-chain-execution-ring-mechanism-for-collateralized-derivative-financial-products-and-interoperability.webp)

## Evolution

The path toward **Post-Quantum Cryptography** has evolved from theoretical curiosity to a standardized requirement. National standards bodies, most notably NIST, have conducted multi-year competitions to identify and validate candidates for global adoption.

This standardization provides the necessary confidence for financial protocols to adopt these primitives, reducing the fragmentation of security standards across the decentralized ecosystem.

> Standardized quantum-resistant algorithms serve as the necessary foundation for maintaining institutional trust in long-term digital asset custody.

The focus has shifted from algorithm selection to deployment logistics. Integrating these standards into hardware wallets, secure enclaves, and consensus engines requires a coordinated effort across the stack. The industry is moving away from bespoke, unproven implementations toward widely audited, standardized primitives that offer predictable performance and security profiles.

![A symmetrical, continuous structure composed of five looping segments twists inward, creating a central vortex against a dark background. The segments are colored in white, blue, dark blue, and green, highlighting their intricate and interwoven connections as they loop around a central axis](https://term.greeks.live/wp-content/uploads/2025/12/cyclical-interconnectedness-of-decentralized-finance-derivatives-and-smart-contract-liquidity-provision.webp)

## Horizon

Future developments will likely involve the optimization of Zero-Knowledge Proofs (ZKPs) for quantum resistance.

The ability to verify transactions without revealing underlying data while simultaneously ensuring resistance to quantum-enabled forgery will redefine privacy-preserving finance. Protocol architects must also prepare for the integration of quantum-resistant state transition functions that can handle the increased computational load of these sophisticated proofs.

| Development Phase | Primary Focus | Systemic Goal |
| --- | --- | --- |
| Short-term | Hybrid algorithm deployment | Mitigating harvest-now-decrypt-later risk |
| Medium-term | Standardized protocol migration | Achieving full quantum-resistant consensus |
| Long-term | Quantum-secure ZK-proofs | Scalable, private, and secure finance |

The ultimate objective remains the creation of a financial system that is mathematically immune to the next generation of computational advancements. Achieving this requires constant vigilance and the willingness to discard legacy assumptions when they no longer hold against evolving adversarial capabilities. The technical landscape is a relentless race between cryptographic hardening and computational power, where the only sustainable strategy is perpetual, proactive adaptation.

## Glossary

### [Smart Contract Security](https://term.greeks.live/area/smart-contract-security/)

Audit ⎊ Smart contract security relies heavily on rigorous audits conducted by specialized firms to identify vulnerabilities before deployment.

### [Smart Contract](https://term.greeks.live/area/smart-contract/)

Code ⎊ This refers to self-executing agreements where the terms between buyer and seller are directly written into lines of code on a blockchain ledger.

## Discover More

### [Cryptographic Auditing](https://term.greeks.live/term/cryptographic-auditing/)
![A futuristic, sleek render of a complex financial instrument or advanced component. The design features a dark blue core layered with vibrant blue structural elements and cream panels, culminating in a bright green circular component. This object metaphorically represents a sophisticated decentralized finance protocol. The integrated modules symbolize a multi-legged options strategy where smart contract automation facilitates risk hedging through liquidity aggregation and precise execution price triggers. The form suggests a high-performance system designed for efficient volatility management in financial derivatives.](https://term.greeks.live/wp-content/uploads/2025/12/high-frequency-trading-protocol-architecture-for-derivative-contracts-and-automated-market-making.webp)

Meaning ⎊ Cryptographic auditing applies zero-knowledge proofs to verify the solvency and operational integrity of decentralized financial systems without revealing sensitive user data.

### [Decentralized Exchange Risks](https://term.greeks.live/term/decentralized-exchange-risks/)
![A futuristic propulsion engine features light blue fan blades with neon green accents, set within a dark blue casing and supported by a white external frame. This mechanism represents the high-speed processing core of an advanced algorithmic trading system in a DeFi derivatives market. The design visualizes rapid data processing for executing options contracts and perpetual futures, ensuring deep liquidity within decentralized exchanges. The engine symbolizes the efficiency required for robust yield generation protocols, mitigating high volatility and supporting the complex tokenomics of a decentralized autonomous organization DAO.](https://term.greeks.live/wp-content/uploads/2025/12/high-efficiency-decentralized-finance-protocol-engine-driving-market-liquidity-and-algorithmic-trading-efficiency.webp)

Meaning ⎊ Decentralized exchange risks encompass the technical and systemic vulnerabilities inherent in autonomous, code-based asset settlement environments.

### [Audit Trail Analysis](https://term.greeks.live/term/audit-trail-analysis/)
![A conceptual rendering of a sophisticated decentralized derivatives protocol engine. The dynamic spiraling component visualizes the path dependence and implied volatility calculations essential for exotic options pricing. A sharp conical element represents the precision of high-frequency trading strategies and Request for Quote RFQ execution in the market microstructure. The structured support elements symbolize the collateralization requirements and risk management framework essential for maintaining solvency in a complex financial derivatives ecosystem.](https://term.greeks.live/wp-content/uploads/2025/12/quant-trading-engine-market-microstructure-analysis-rfq-optimization-collateralization-ratio-derivatives.webp)

Meaning ⎊ Audit Trail Analysis provides the cryptographic verification of state transitions, ensuring integrity and risk transparency in decentralized markets.

### [Market Manipulation Protection](https://term.greeks.live/term/market-manipulation-protection/)
![A multi-layered structure visually represents a structured financial product in decentralized finance DeFi. The bright blue and green core signifies a synthetic asset or a high-yield trading position. This core is encapsulated by several protective layers, representing a sophisticated risk stratification strategy. These layers function as collateralization mechanisms and hedging shields against market volatility. The nested architecture illustrates the composability of derivative contracts, where assets are wrapped in layers of security and liquidity provision protocols. This design emphasizes robust collateral management and mitigation of counterparty risk within a transparent framework.](https://term.greeks.live/wp-content/uploads/2025/12/visualizing-multi-layered-collateralization-architecture-for-structured-derivatives-within-a-defi-protocol-ecosystem.webp)

Meaning ⎊ Market Manipulation Protection provides the algorithmic defense required to maintain derivative price integrity against adversarial market actors.

### [Underwriting Pool](https://term.greeks.live/definition/underwriting-pool/)
![An abstract layered structure visualizes intricate financial derivatives and structured products in a decentralized finance ecosystem. Interlocking layers represent different tranches or positions within a liquidity pool, illustrating risk-hedging strategies like delta hedging against impermanent loss. The form's undulating nature visually captures market volatility dynamics and the complexity of an options chain. The different color layers signify distinct asset classes and their interconnectedness within an Automated Market Maker AMM framework.](https://term.greeks.live/wp-content/uploads/2025/12/visualization-of-complex-liquidity-pool-dynamics-and-structured-financial-products-within-defi-ecosystems.webp)

Meaning ⎊ Aggregated capital provided by liquidity providers to back insurance claims or cover potential protocol losses.

### [Yield Farming Risk Mitigation](https://term.greeks.live/definition/yield-farming-risk-mitigation/)
![A detailed cutaway view reveals the inner workings of a high-tech mechanism, depicting the intricate components of a precision-engineered financial instrument. The internal structure symbolizes the complex algorithmic trading logic used in decentralized finance DeFi. The rotating elements represent liquidity flow and execution speed necessary for high-frequency trading and arbitrage strategies. This mechanism illustrates the composability and smart contract processes crucial for yield generation and impermanent loss mitigation in perpetual swaps and options pricing. The design emphasizes protocol efficiency for risk management.](https://term.greeks.live/wp-content/uploads/2025/12/precision-engineered-protocol-mechanics-for-decentralized-finance-yield-generation-and-options-pricing.webp)

Meaning ⎊ Strategies to protect against risks like impermanent loss and exploits in yield farming programs.

### [Capital Reserves](https://term.greeks.live/term/capital-reserves/)
![A detailed cutaway view of a high-performance engine illustrates the complex mechanics of an algorithmic execution core. This sophisticated design symbolizes a high-throughput decentralized finance DeFi protocol where automated market maker AMM algorithms manage liquidity provision for perpetual futures and volatility swaps. The internal structure represents the intricate calculation process, prioritizing low transaction latency and efficient risk hedging. The system’s precision ensures optimal capital efficiency and minimizes slippage in volatile derivatives markets.](https://term.greeks.live/wp-content/uploads/2025/12/advanced-protocol-architecture-for-decentralized-derivatives-trading-with-high-capital-efficiency.webp)

Meaning ⎊ Capital Reserves serve as the automated liquidity buffers that maintain protocol solvency and ensure settlement integrity in decentralized markets.

### [Solvency Calculation](https://term.greeks.live/term/solvency-calculation/)
![A stylized, high-tech emblem featuring layers of dark blue and green with luminous blue lines converging on a central beige form. The dynamic, multi-layered composition visually represents the intricate structure of exotic options and structured financial products. The energetic flow symbolizes high-frequency trading algorithms and the continuous calculation of implied volatility. This visualization captures the complexity inherent in decentralized finance protocols and risk-neutral valuation. The central structure can be interpreted as a core smart contract governing automated market making processes.](https://term.greeks.live/wp-content/uploads/2025/12/algorithmic-trading-smart-contract-architecture-visualization-for-exotic-options-and-high-frequency-execution.webp)

Meaning ⎊ Solvency Calculation is the mathematical framework that ensures decentralized derivative protocols remain fully collateralized during market volatility.

### [Black Swan Event Protection](https://term.greeks.live/term/black-swan-event-protection/)
![An abstract visualization depicting a volatility surface where the undulating dark terrain represents price action and market liquidity depth. A central bright green locus symbolizes a sudden increase in implied volatility or a significant gamma exposure event resulting from smart contract execution or oracle updates. The surrounding particle field illustrates the continuous flux of order flow across decentralized exchange liquidity pools, reflecting high-frequency trading algorithms reacting to price discovery.](https://term.greeks.live/wp-content/uploads/2025/12/dynamic-visualization-of-high-frequency-trading-market-volatility-and-price-discovery-in-decentralized-financial-derivatives.webp)

Meaning ⎊ Tail risk hedging provides essential capital protection by converting extreme market volatility into controlled, resilient financial outcomes.

---

## Raw Schema Data

```json
{
    "@context": "https://schema.org",
    "@type": "BreadcrumbList",
    "itemListElement": [
        {
            "@type": "ListItem",
            "position": 1,
            "name": "Home",
            "item": "https://term.greeks.live"
        },
        {
            "@type": "ListItem",
            "position": 2,
            "name": "Term",
            "item": "https://term.greeks.live/term/"
        },
        {
            "@type": "ListItem",
            "position": 3,
            "name": "Post-Quantum Cryptography",
            "item": "https://term.greeks.live/term/post-quantum-cryptography/"
        }
    ]
}
```

```json
{
    "@context": "https://schema.org",
    "@type": "Article",
    "mainEntityOfPage": {
        "@type": "WebPage",
        "@id": "https://term.greeks.live/term/post-quantum-cryptography/"
    },
    "headline": "Post-Quantum Cryptography ⎊ Term",
    "description": "Meaning ⎊ Post-Quantum Cryptography secures decentralized financial ledgers against quantum-enabled attacks to ensure long-term transaction and asset integrity. ⎊ Term",
    "url": "https://term.greeks.live/term/post-quantum-cryptography/",
    "author": {
        "@type": "Person",
        "name": "Greeks.live",
        "url": "https://term.greeks.live/author/greeks-live/"
    },
    "datePublished": "2026-03-11T21:58:08+00:00",
    "dateModified": "2026-03-11T21:58:43+00:00",
    "publisher": {
        "@type": "Organization",
        "name": "Greeks.live"
    },
    "articleSection": [
        "Term"
    ],
    "image": {
        "@type": "ImageObject",
        "url": "https://term.greeks.live/wp-content/uploads/2025/12/collateralization-of-structured-products-and-layered-risk-tranches-in-decentralized-finance-ecosystems.jpg",
        "caption": "A complex, layered abstract form dominates the frame, showcasing smooth, flowing surfaces in dark blue, beige, bright blue, and vibrant green. The various elements fit together organically, suggesting a cohesive, multi-part structure with a central core. This visualization captures the essence of a structured product in decentralized finance, where a principal investment is wrapped with various risk tranches. The dark outer layer acts as a protective collateral pool, managing counterparty risk. The bright green core represents a yield-bearing asset, while the internal blue layers signify subordinate tranches or leverage positions with specific collateralization ratios. The entire structure illustrates complex smart contract logic for dynamic hedging and automated risk management, crucial elements in options trading and financial derivatives. The multi-layered design reflects the complexity required for effective liquidity provision and structured products within modern financial ecosystems."
    },
    "keywords": [
        "Account Ownership Security",
        "Adversarial Environments",
        "Algorithm Complexity Reduction",
        "Algorithm Security Assessment",
        "Behavioral Game Theory Applications",
        "Blockchain Technology Security",
        "Blockchain Trust Layers",
        "Blockchain Validation Mechanisms",
        "Code-Based Cryptography",
        "Computational Complexity Theory",
        "Consensus Engine Hardening",
        "Consensus Mechanism Resilience",
        "Cryptographic Agility",
        "Cryptographic Algorithm Analysis",
        "Cryptographic Algorithm Development",
        "Cryptographic Algorithm Optimization",
        "Cryptographic Algorithm Resilience",
        "Cryptographic Algorithm Selection",
        "Cryptographic Key Exchange",
        "Cryptographic Modernization",
        "Cryptographic Primitive Migration",
        "Cryptographic Primitives Transition",
        "Cryptographic Protocol Security",
        "Cryptographic Security Enhancements",
        "Cryptographic Standard Evolution",
        "Decentralized Application Security",
        "Decentralized Finance Ecosystem",
        "Decentralized Finance Innovation",
        "Decentralized Finance Regulation",
        "Decentralized Finance Security",
        "Decentralized Financial Integrity",
        "Decentralized Ledger Protection",
        "Decentralized Ledger Technology",
        "Decentralized System Evolution",
        "Decentralized System Security",
        "Derivative Liquidity Safeguards",
        "Digital Asset Security",
        "Digital Asset Volatility",
        "Digital Signature Forgery",
        "Elliptic Curve Cryptography",
        "Exponential Time Security",
        "Failure Propagation Analysis",
        "Financial Asset Preservation",
        "Financial Asset Protection",
        "Financial Data Protection",
        "Financial Derivative Security",
        "Financial History Analysis",
        "Financial Infrastructure Protection",
        "Financial Market Stability",
        "Financial Risk Management",
        "Financial Security Standards",
        "Financial System Modernization",
        "Financial System Resilience",
        "Fundamental Analysis Metrics",
        "Governance Model Security",
        "Hardware Wallet Security",
        "Harvest Now Decrypt Later",
        "Hash-Based Cryptography",
        "Hash-Based Signatures",
        "High Value Instruments",
        "Hybrid Cryptographic Schemes",
        "Isogeny-Based Cryptography",
        "Jurisdictional Differences",
        "Lattice Based Signature",
        "Lattice-Based Cryptography",
        "Legal Framework Impacts",
        "Long Term Asset Preservation",
        "Long Term Data Integrity",
        "Long Term Security Guarantees",
        "Macro-Crypto Correlation",
        "Market Microstructure Security",
        "Modular Cryptographic Framework",
        "Multivariate Cryptography",
        "Multivariate Quadratic Equation",
        "Network Data Evaluation",
        "NIST Standardization",
        "Order Flow Integrity",
        "Performance Overhead Balancing",
        "Polynomial Time Attacks",
        "Post Quantum Blockchain",
        "Post Quantum Compliance",
        "Post Quantum Cryptography Adoption",
        "Post Quantum Future",
        "Post Quantum Implementation",
        "Post Quantum Migration Strategy",
        "Post Quantum Protocols",
        "Post Quantum Security Architecture",
        "Post Quantum Standards",
        "Post Quantum Transition Planning",
        "Post-Quantum Cryptography",
        "Post-Quantum Readiness",
        "Protocol Physics Implications",
        "Public Key Infrastructure",
        "Quantitative Finance Modeling",
        "Quantum Algorithm Resistance",
        "Quantum Computing Advancements",
        "Quantum Computing Attacks",
        "Quantum Computing Challenges",
        "Quantum Computing Impact",
        "Quantum Computing Implications",
        "Quantum Computing Research",
        "Quantum Enabled Threats",
        "Quantum Error Correction",
        "Quantum Key Distribution",
        "Quantum Physics Intersection",
        "Quantum Resistant Infrastructure",
        "Quantum Resistant Ledger",
        "Quantum Safe Cryptography",
        "Quantum Secure Custody",
        "Quantum Threat Landscape",
        "Quantum Threat Mitigation",
        "Quantum Threat Model",
        "Quantum-Resistant Algorithms",
        "Regulatory Arbitrage Considerations",
        "Revenue Generation Analysis",
        "Risk Sensitivity Analysis",
        "RSA Vulnerability",
        "Secure Enclave Deployment",
        "Secure Transaction Processing",
        "Shor Algorithm Mitigation",
        "Shor's Algorithm Threat",
        "Signature Size Optimization",
        "Smart Contract Security",
        "Smart Contract Vulnerabilities",
        "State Transition Function",
        "Systemic Relevance Shift",
        "Systems Risk Mitigation",
        "Tokenomics Incentive Structures",
        "Transaction Finality Integrity",
        "Trend Forecasting Techniques",
        "Usage Metrics Assessment",
        "Zero-Knowledge Proof Resilience"
    ]
}
```

```json
{
    "@context": "https://schema.org",
    "@type": "WebSite",
    "url": "https://term.greeks.live/",
    "potentialAction": {
        "@type": "SearchAction",
        "target": "https://term.greeks.live/?s=search_term_string",
        "query-input": "required name=search_term_string"
    }
}
```

```json
{
    "@context": "https://schema.org",
    "@type": "WebPage",
    "@id": "https://term.greeks.live/term/post-quantum-cryptography/",
    "mentions": [
        {
            "@type": "DefinedTerm",
            "@id": "https://term.greeks.live/area/smart-contract-security/",
            "name": "Smart Contract Security",
            "url": "https://term.greeks.live/area/smart-contract-security/",
            "description": "Audit ⎊ Smart contract security relies heavily on rigorous audits conducted by specialized firms to identify vulnerabilities before deployment."
        },
        {
            "@type": "DefinedTerm",
            "@id": "https://term.greeks.live/area/smart-contract/",
            "name": "Smart Contract",
            "url": "https://term.greeks.live/area/smart-contract/",
            "description": "Code ⎊ This refers to self-executing agreements where the terms between buyer and seller are directly written into lines of code on a blockchain ledger."
        }
    ]
}
```


---

**Original URL:** https://term.greeks.live/term/post-quantum-cryptography/
