Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
When Security Meets Usability: An Empirical Investigation of Post-Quantum Cryptography APIs
by
Tseitkin, Samuel
, Shakya, R D N
, Zhao, Raymond K
, Arachchilage, Nalin
, Toruan, Marthin
in
Application programming interface
/ Cognitive tasks
/ Computer systems
/ Cryptography
/ Cybersecurity
/ Empirical analysis
/ Quantum computing
/ Quantum cryptography
/ Software development
/ Usability
2026
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
When Security Meets Usability: An Empirical Investigation of Post-Quantum Cryptography APIs
by
Tseitkin, Samuel
, Shakya, R D N
, Zhao, Raymond K
, Arachchilage, Nalin
, Toruan, Marthin
in
Application programming interface
/ Cognitive tasks
/ Computer systems
/ Cryptography
/ Cybersecurity
/ Empirical analysis
/ Quantum computing
/ Quantum cryptography
/ Software development
/ Usability
2026
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
When Security Meets Usability: An Empirical Investigation of Post-Quantum Cryptography APIs
by
Tseitkin, Samuel
, Shakya, R D N
, Zhao, Raymond K
, Arachchilage, Nalin
, Toruan, Marthin
in
Application programming interface
/ Cognitive tasks
/ Computer systems
/ Cryptography
/ Cybersecurity
/ Empirical analysis
/ Quantum computing
/ Quantum cryptography
/ Software development
/ Usability
2026
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
When Security Meets Usability: An Empirical Investigation of Post-Quantum Cryptography APIs
Paper
When Security Meets Usability: An Empirical Investigation of Post-Quantum Cryptography APIs
2026
Request Book From Autostore
and Choose the Collection Method
Overview
Advances in quantum computing increasingly threaten the security and privacy of data protected by current cryptosystems, particularly those relying on public-key cryptography. In response, the international cybersecurity community has prioritized the implementation of Post-Quantum Cryptography (PQC), a new cryptographic standard designed to resist quantum attacks while operating on classical computers. The National Institute of Standards and Technology (NIST) has already standardized several PQC algorithms and plans to deprecate classical asymmetric schemes, such as RSA and ECDSA, by 2035. Despite this urgency, PQC adoption remains slow, often due to limited developer expertise. Application Programming Interfaces (APIs) are intended to bridge this gap, yet prior research on classical security APIs demonstrates that poor usability of cryptographic APIs can lead developers to introduce vulnerabilities during implementation of the applications, a risk amplified by the novelty and complexity of PQC. To date, the usability of PQC APIs has not been systematically studied. This research presents an empirical evaluation of the usability of the PQC APIs, observing how developers interact with APIs and documentation during software development tasks. The study identifies cognitive factors that influence the developer's performance when working with PQC primitives with minimal onboarding. The findings highlight opportunities across the PQC ecosystem to improve developer-facing guidance, terminology alignment, and workflow examples to better support non-specialists.
Publisher
Cornell University Library, arXiv.org
This website uses cookies to ensure you get the best experience on our website.