封面
市場調查報告書
商品編碼
2024093

後量子密碼市場預測至2034年:按交付方式、演算法類型、部署方式、最終用戶和地區分類的全球分析

Post-Quantum Cryptography Market Forecasts to 2034 - Global Analysis By Offering (Solutions and Services), Algorithm Type, Deployment Mode, End User and By Geography

出版日期: | 出版商: Stratistics Market Research Consulting | 英文 | 商品交期: 2-3個工作天內

價格

根據 Stratistics MRC 的數據,全球後量子密碼市場預計將在 2026 年達到 7 億美元,到 2034 年達到 192 億美元,在預測期內以 49.5% 的複合年成長率成長。

後量子密碼學(PQC)是密碼學的一個分支,專注於開發能夠抵禦量子電腦攻擊的加密方法。隨著大規模量子運算的實用化,傳統的加密系統可能會變得不堪一擊。 PQC 利用傳統電腦和量子電腦都難以求解的數學難題。這些演算法旨在現有計算系統和通訊網路上運行,透過抵禦基於量子的威脅,確保敏感資料和數位通訊的未來安全。

量子解碼的威脅日益加劇

理論上,使用肖爾演算法的量子電腦可以在數小時內破解這些協議,從而可能危及全球數位基礎設施。各國政府和企業正在加速採用後量子加密(PQC),以保護敏感資料免受潛在的「先收集後解密」攻擊。全球對量子舉措和後量子路線藍圖的投資不斷增加,迫使各組織升級其加密資產。資料保存法規進一步加劇了這種迫切性。由於今天被竊取的加密資料可能被未來的量子系統解密,因此主動過渡到後量子加密對於確保長期安全至關重要。

遷移的複雜性與高昂成本

從傳統密碼學到後量子密碼的過渡需要對舊有系統、硬體模組和通訊協定進行徹底改造。企業在不中斷現有營運的情況下整合後量子密碼演算法面臨巨大的技術挑戰。小規模的組織則難以承擔密碼審計、員工再培訓和系統升級所帶來的財務負擔。此外,平行運行傳統演算法和後量子密碼演算法的混合密碼模式需要更高的運算資源。這些限制減緩了後量子密碼的普及,尤其是在那些操作技術環境嚴重依賴舊有系統的產業中。

政府指令和合規要求

全球監管機構正在製定向抗量子系統過渡的指導方針和期限。美國國家標準與技術研究院 (NIST) 已最終確定了 PQC 標準,歐盟和其他地區也在製定類似的框架。歐盟《網路安全法案》和美國《量子運算與網路安全準備法案》等指令的合規性正在推動公共和私營部門採用 PQC 解決方案。這種監管推動為提供過渡工具、諮詢和管理服務的供應商創造了數十億美元的商機。早期採用者可以透過展示其量子運算準備來獲得競爭優勢,而技術提供者可以透過將 PQC 整合到其現有的安全套件中來加速市場滲透。

不成熟的標準和演算法漏洞

儘管美國國家標準與技術研究院 (NIST) 已將多種密碼學品質控制 (PQC) 演算法標準化,但與傳統密碼學相比,該領域仍處於發展階段。新的解密技術不斷揭示基於格、基於程式碼和多元方案中的潛在漏洞。未被發現的後門和數學缺陷所帶來的風險嚴重威脅著人們對 PQC 解決方案的長期信心。此外,PQC 的硬體加速尚未普及,導致在高吞吐量環境中出現延遲問題。組織可能會延後採用,直到演算法進一步成熟,造成一段安全風險易發期。如果沒有持續監控和靈活的密碼學防禦措施,一旦早期採用者選擇的演算法遭到破壞,他們可能被迫進行代價高昂的重新遷移。

新冠疫情的影響

疫情加速了數位轉型,擴大了遠距辦公、遠端醫療和雲端服務的攻擊面。資料交換的激增提高了人們對長期密碼風險(包括量子威脅)的認知。然而,由於預算重新分配給了即時疫情的緊急措施,一些密碼學和量子計算(PQC)研究和先導計畫被推遲。供應鏈中斷影響了用於密碼測試的硬體安全模組的供應。同時,政府的經濟刺激計畫中包含了網路安全現代化的資金,間接地支持了PQC的準備工作。後疫情時代的策略強調密碼學敏捷性,各組織將PQC整合到零信任架構和長期資料保護計畫中,並將量子彈性視為業務永續營運的關鍵要素。

在預測期內,解決方案領域預計將佔據最大的市場佔有率。

解決方案領域預計將佔據最大的市場佔有率,這主要得益於市場對抗量子密碼工具、金鑰管理系統和安全通訊平台的迫切需求。企業正優先採用軟體庫和硬體模組來取代易受攻擊的RSA和ECC實現方案。密碼工具能夠保護靜態資料和傳輸中的數據,而金鑰管理則確保了安全密碼生命週期的管治。基於PQC演算法的數位簽章可以防止法律和金融交易中的偽造行為。

預計在預測期內,銀行、金融服務和保險(BFSI)行業將呈現最高的複合年成長率。

在預測期內,銀行、金融服務和保險(BFSI)產業預計將呈現最高成長率,這主要得益於對金融資料長期儲存、交易完整性和支付系統保護的需求。銀行和保險公司面臨「先採集後解密」攻擊的重大風險,此類攻擊的目標包括電匯、客戶記錄和區塊鏈資產。來自中央銀行和金融監管機構的壓力正在加速量子運算(PQC)的試點部署和過渡。將抗量子演算法整合到自動櫃員機(ATM)、網路銀行平台和銀行間支付系統的進程正在穩步推進。

市佔率最大的地區:

在整個預測期內,北美預計將保持最大的市場佔有率,這主要得益於美國國家標準與技術研究院 (NIST) 和國防安全保障部等政府主導的積極舉措。美國在密碼學品質控制 (PQC) 標準化、研究經費投入以及國防、金融和雲端運算領域的早期應用方面均處於領先地位。主要技術供應商和密碼學Start-Ups的存在正在加速產品的商業化。國家實驗室、大學和私人企業之間的密切合作正在推動演算法的開發和測試。

複合年成長率最高的地區:

在預測期內,亞太地區預計將呈現最高的複合年成長率,這主要得益於中國、日本、印度和韓國的快速數位化進程以及對量子計算的不斷深入探索。各國政府正在推出國家級量子任務和後量子轉型藍圖,以保護關鍵基礎設施。日益成長的跨境資料流動以及來自國家支持的網路威脅加劇了量子運算部署的迫切性。不斷發展的金融、保險和證券(BFSI)、電信和電子商務產業正在尋求能夠抵禦量子攻擊的解決方案,以實現長期的資料保護。

免費客製化服務:

所有購買此報告的客戶均可享受以下免費自訂選項之一:

  • 企業概況
    • 對其他市場參與者(最多 3 家公司)進行全面分析
    • 對主要企業進行SWOT分析(最多3家公司)
  • 區域細分
    • 應客戶要求,我們提供主要國家和地區的市場估算和預測,以及複合年成長率(註:需進行可行性檢查)。
  • 競爭性標竿分析
    • 根據產品系列、地理覆蓋範圍和策略聯盟對主要企業進行基準分析。

目錄

第1章執行摘要

  • 市場概覽及主要亮點
  • 促進因素、挑戰與機遇
  • 競爭格局概述
  • 戰略洞察與建議

第2章:研究框架

  • 研究目標和範圍
  • 相關人員分析
  • 研究假設和限制
  • 調查方法

第3章 市場動態與趨勢分析

  • 市場定義與結構
  • 主要市場促進因素
  • 市場限制與挑戰
  • 投資成長機會和重點領域
  • 產業威脅與風險評估
  • 技術與創新展望
  • 新興市場/高成長市場
  • 監管和政策環境
  • 新冠疫情的影響及復甦前景

第4章:競爭環境與策略評估

  • 波特五力分析
    • 供應商的議價能力
    • 買方的議價能力
    • 替代品的威脅
    • 新進入者的威脅
    • 競爭公司之間的競爭
  • 主要企業市佔率分析
  • 產品基準評效和效能比較

第5章:全球後量子密碼市場:依產品/服務分類

  • 解決方案
    • 加密工具
    • 關鍵管理
    • 安全通訊
    • 數位簽章
  • 服務
    • 諮詢
    • 整合與部署
    • 支援與維護

第6章:全球後量子密碼市場:依演算法類型分類

  • 網格基礎
  • 程式碼庫
  • 多變數
  • 哈希基
  • 同源基礎

第7章:全球後量子密碼市場:依部署模式分類

  • 現場
    • 公共雲端
    • 私有雲端
    • 混合雲端

第8章:全球後量子密碼市場:以最終用戶分類

  • BFSI
  • 政府/國防
  • 資訊科技/通訊
  • 衛生保健
  • 零售與電子商務
  • 製造業
  • 能源公用事業
  • 其他最終用戶

第9章:全球後量子密碼市場:按地區分類

  • 北美洲
    • 美國
    • 加拿大
    • 墨西哥
  • 歐洲
    • 英國
    • 德國
    • 法國
    • 義大利
    • 西班牙
    • 荷蘭
    • 比利時
    • 瑞典
    • 瑞士
    • 波蘭
    • 其他歐洲國家
  • 亞太地區
    • 中國
    • 日本
    • 印度
    • 韓國
    • 澳洲
    • 印尼
    • 泰國
    • 馬來西亞
    • 新加坡
    • 越南
    • 其他亞太國家
  • 南美洲
    • 巴西
    • 阿根廷
    • 哥倫比亞
    • 智利
    • 秘魯
    • 其他南美國家
  • 世界其他地區(RoW)
    • 中東
      • 沙烏地阿拉伯
      • 阿拉伯聯合大公國
      • 卡達
      • 以色列
      • 其他中東國家
    • 非洲
      • 南非
      • 埃及
      • 摩洛哥
      • 其他非洲國家

第10章 戰略市場資訊

  • 工業價值網路和供應鏈評估
  • 空白區域和機會地圖
  • 產品演進與市場生命週期分析
  • 通路、經銷商和打入市場策略的評估

第11章 產業趨勢與策略舉措

  • 併購
  • 夥伴關係、聯盟和合資企業
  • 新產品發布和認證
  • 擴大生產能力和投資
  • 其他策略舉措

第12章:公司簡介

  • IBM Corporation
  • Microsoft Corporation
  • Amazon Web Services(AWS)
  • NXP Semiconductors
  • Thales Group
  • IDEMIA
  • Palo Alto Networks
  • DigiCert
  • PQShield
  • Post Quantum Ltd.
  • ISARA Corporation
  • QuintessenceLabs
  • Quantum Xchange
  • Keyfactor
  • QuSecure
Product Code: SMRC35305

According to Stratistics MRC, the Global Post-Quantum Cryptography Market is accounted for $0.7 billion in 2026 and is expected to reach $19.2 billion by 2034, growing at a CAGR of 49.5% during the forecast period. Post-Quantum Cryptography (PQC) is a field of cryptography focused on developing encryption methods capable of resisting attacks from quantum computers. Traditional cryptographic systems may become vulnerable once large-scale quantum computing becomes practical. PQC uses mathematical problems that are considered difficult for both classical and quantum computers to solve. These algorithms are designed to run on existing computing systems and communication networks while providing protection against quantum-based threats, ensuring that sensitive data and digital communications remain secure in the future.

Market Dynamics:

Driver:

Growing threat of quantum decryption

Quantum machines using Shor's algorithm can theoretically break these protocols within hours, exposing global digital infrastructure. Governments and enterprises are accelerating PQC adoption to safeguard sensitive data against future harvest-now-decrypt-later attacks. Increasing investments in national quantum initiatives and post-quanture roadmaps are compelling organizations to upgrade cryptographic assets. The urgency is further amplified by data retention regulations, as stolen encrypted data today could be decrypted by future quantum systems, making proactive migration to PQC a strategic imperative for long-term security.

Restraint:

High migration complexity and costs

Transitioning from classical to post-quantum cryptography involves overhauling legacy systems, hardware modules, and communication protocols. Enterprises face significant technical challenges in integrating PQC algorithms without disrupting existing operations. Smaller organizations struggle with the financial burden of cryptographic audits, staff retraining, and system upgrades. Additionally, hybrid cryptographic modes that run classical and PQC algorithms in parallel demand higher computational resources. These constraints slow down mass adoption, particularly in industries with legacy-dependent operational technology environments.

Opportunity:

Government mandates and compliance requirements

Regulatory bodies worldwide are issuing guidelines and deadlines for quantum-safe migration. The U.S. National Institute of Standards and Technology (NIST) has finalized PQC standards, while the EU and other regions are developing similar frameworks. Compliance with directives such as the EU Cybersecurity Act and U.S. Quantum Computing Cybersecurity Preparedness Act is forcing public and private sectors to adopt PQC solutions. This regulatory push creates a multi-billion-dollar opportunity for vendors offering migration tools, consulting, and managed services. Early adopters gain competitive advantage by demonstrating quantum readiness, while technology providers can bundle PQC with existing security suites to accelerate market penetration.

Threat:

Immature standards and algorithm vulnerabilities

Although NIST has standardized several PQC algorithms, the field remains relatively young compared to classical cryptography. New cryptanalysis techniques continue to uncover potential vulnerabilities in lattice-based, code-based, and multivariate schemes. The risk of undiscovered backdoors or mathematical weaknesses poses a serious threat to long-term trust in PQC solutions. Furthermore, hardware acceleration for PQC is not yet widespread, leading to latency issues in high-throughput environments. Organizations may delay adoption until algorithms mature further, creating a window of exposure. Without continuous monitoring and agile cryptographic agility, early adopters could face costly re-migrations if selected algorithms are compromised.

Covid-19 Impact

The pandemic accelerated digital transformation, expanding attack surfaces across remote work, telehealth, and cloud services. This surge in data exchange heightened awareness of long-term cryptographic risks, including quantum threats. However, budget reallocations toward immediate pandemic response delayed some PQC research and pilot projects. Supply chain disruptions affected hardware security module availability for cryptographic testing. Conversely, government stimulus packages included cybersecurity modernization funds, indirectly supporting PQC readiness. Post-pandemic strategies now emphasize cryptographic agility, with organizations integrating PQC into zero-trust architectures and long-term data protection plans, recognizing quantum resilience as a critical business continuity factor.

The solutions segment is expected to be the largest during the forecast period

The solutions segment is expected to account for the largest market share, driven by immediate demand for quantum-resistant encryption tools, key management systems, and secure communication platforms. Enterprises are prioritizing software libraries and hardware modules that replace vulnerable RSA and ECC implementations. Encryption tools enable data-at-rest and in-transit protection, while key management ensures secure cryptographic lifecycle governance. Digital signatures based on PQC algorithms prevent forgery in legal and financial transactions.

The BFSI segment is expected to have the highest CAGR during the forecast period

Over the forecast period, the BFSI segment is predicted to witness the highest growth rate, driven by the need to protect long-lived financial data, transaction integrity, and payment systems. Banks and insurance firms face significant risks from harvest-now-decrypt-later attacks on wire transfers, customer records, and blockchain assets. Regulatory pressure from central banks and financial authorities is accelerating PQC pilots and migrations. Integration of quantum-safe algorithms into ATMs, online banking platforms, and interbank settlement systems is rising.

Region with largest share:

During the forecast period, the North America region is expected to hold the largest market share, fuelled by aggressive government initiatives from NIST and the Department of Homeland Security. The United States leads in PQC standardization, research funding, and early adoption across defense, finance, and cloud sectors. Presence of major technology vendors and cryptographic startups accelerates product commercialization. Strong collaboration between national labs, universities, and private enterprises drives algorithm development and testing.

Region with highest CAGR:

Over the forecast period, the Asia Pacific region is anticipated to exhibit the highest CAGR, supported by rapid digitalization and growing quantum computing research in China, Japan, India, and South Korea. Governments are launching national quantum missions and post-quantum migration roadmaps to protect critical infrastructure. Increasing cross-border data flows and cyber threats from state-sponsored actors drive urgency for PQC adoption. Expanding BFSI, telecom, and e-commerce sectors seek quantum-safe solutions for long-term data protection.

Key players in the market

Some of the key players in Post-Quantum Cryptography Market include IBM Corporation, Microsoft Corporation, Amazon Web Services, NXP Semiconductors, Thales Group, IDEMIA, Palo Alto Networks, DigiCert, PQShield, Post-Quantum Ltd., ISARA Corporation, QuintessenceLabs, Quantum Xchange, Keyfactor, and QuSecure.

Key Developments:

In March 2026, IBM and ETH Zurich announced a 10-year collaboration to advance the next generation of algorithms at the intersection of AI and quantum computing. This initiative represents the latest milestone in the long-standing collaboration between the two institutions, further strengthening a scientific exchange that has helped create the future of information technology.

In March 2026, Thales partners with Service Oklahoma to launch next-generation driver licenses and ID cards. Service Oklahoma has selected Thales to deliver new driver licenses and ID cards designed for maximum security, durability, and sustainability. The new credentials are made from 100% polycarbonate, a durable material that embeds advanced security features to prevent fraud.

Offerings Covered:

  • Solutions
  • Services

Algorithm Types Covered:

  • Lattice- based
  • Code- based
  • Multivariate
  • Hash- based
  • Isogeny- based

Deployment Modes Covered:

  • On-Premises
  • Cloud

End Users Covered:

  • BFSI
  • Government & Defense
  • IT & Telecom
  • Healthcare
  • Retail & eCommerce
  • Manufacturing
  • Energy & Utilities
  • Other End Users

Regions Covered:

  • North America
    • United States
    • Canada
    • Mexico
  • Europe
    • United Kingdom
    • Germany
    • France
    • Italy
    • Spain
    • Netherlands
    • Belgium
    • Sweden
    • Switzerland
    • Poland
    • Rest of Europe
  • Asia Pacific
    • China
    • Japan
    • India
    • South Korea
    • Australia
    • Indonesia
    • Thailand
    • Malaysia
    • Singapore
    • Vietnam
    • Rest of Asia Pacific
  • South America
    • Brazil
    • Argentina
    • Colombia
    • Chile
    • Peru
    • Rest of South America
  • Rest of the World (RoW)
    • Middle East
  • Saudi Arabia
  • United Arab Emirates
  • Qatar
  • Israel
  • Rest of Middle East
    • Africa
  • South Africa
  • Egypt
  • Morocco
  • Rest of Africa

What our report offers:

  • Market share assessments for the regional and country-level segments
  • Strategic recommendations for the new entrants
  • Covers Market data for the years 2023, 2024, 2025, 2026, 2027, 2028, 2030, 2032 and 2034
  • Market Trends (Drivers, Constraints, Opportunities, Threats, Challenges, Investment Opportunities, and recommendations)
  • Strategic recommendations in key business segments based on the market estimations
  • Competitive landscaping mapping the key common trends
  • Company profiling with detailed strategies, financials, and recent developments
  • Supply chain trends mapping the latest technological advancements

Free Customization Offerings:

All the customers of this report will be entitled to receive one of the following free customization options:

  • Company Profiling
    • Comprehensive profiling of additional market players (up to 3)
    • SWOT Analysis of key players (up to 3)
  • Regional Segmentation
    • Market estimations, Forecasts and CAGR of any prominent country as per the client's interest (Note: Depends on feasibility check)
  • Competitive Benchmarking
    • Benchmarking of key players based on product portfolio, geographical presence, and strategic alliances

Table of Contents

1 Executive Summary

  • 1.1 Market Snapshot and Key Highlights
  • 1.2 Growth Drivers, Challenges, and Opportunities
  • 1.3 Competitive Landscape Overview
  • 1.4 Strategic Insights and Recommendations

2 Research Framework

  • 2.1 Study Objectives and Scope
  • 2.2 Stakeholder Analysis
  • 2.3 Research Assumptions and Limitations
  • 2.4 Research Methodology
    • 2.4.1 Data Collection (Primary and Secondary)
    • 2.4.2 Data Modeling and Estimation Techniques
    • 2.4.3 Data Validation and Triangulation
    • 2.4.4 Analytical and Forecasting Approach

3 Market Dynamics and Trend Analysis

  • 3.1 Market Definition and Structure
  • 3.2 Key Market Drivers
  • 3.3 Market Restraints and Challenges
  • 3.4 Growth Opportunities and Investment Hotspots
  • 3.5 Industry Threats and Risk Assessment
  • 3.6 Technology and Innovation Landscape
  • 3.7 Emerging and High-Growth Markets
  • 3.8 Regulatory and Policy Environment
  • 3.9 Impact of COVID-19 and Recovery Outlook

4 Competitive and Strategic Assessment

  • 4.1 Porter's Five Forces Analysis
    • 4.1.1 Supplier Bargaining Power
    • 4.1.2 Buyer Bargaining Power
    • 4.1.3 Threat of Substitutes
    • 4.1.4 Threat of New Entrants
    • 4.1.5 Competitive Rivalry
  • 4.2 Market Share Analysis of Key Players
  • 4.3 Product Benchmarking and Performance Comparison

5 Global Post-Quantum Cryptography Market, By Offering

  • 5.1 Solutions
    • 5.1.1 Encryption Tools
    • 5.1.2 Key Management
    • 5.1.3 Secure Communication
    • 5.1.4 Digital Signatures
  • 5.2 Services
    • 5.2.1 Consulting
    • 5.2.2 Integration & Deployment
    • 5.2.3 Support & Maintenance

6 Global Post-Quantum Cryptography Market, By Algorithm Type

  • 6.1 Lattice based
  • 6.2 Code based
  • 6.3 Multivariate
  • 6.4 Hash based
  • 6.5 Isogeny based

7 Global Post-Quantum Cryptography Market, By Deployment Mode

  • 7.1 On Premises
  • 7.2 Cloud
    • 7.2.1 Public Cloud
    • 7.2.2 Private Cloud
    • 7.2.3 Hybrid Cloud

8 Global Post-Quantum Cryptography Market, By End User

  • 8.1 BFSI
  • 8.2 Government & Defense
  • 8.3 IT & Telecom
  • 8.4 Healthcare
  • 8.5 Retail & eCommerce
  • 8.6 Manufacturing
  • 8.7 Energy & Utilities
  • 8.8 Other End Users

9 Global Post-Quantum Cryptography Market, By Geography

  • 9.1 North America
    • 9.1.1 United States
    • 9.1.2 Canada
    • 9.1.3 Mexico
  • 9.2 Europe
    • 9.2.1 United Kingdom
    • 9.2.2 Germany
    • 9.2.3 France
    • 9.2.4 Italy
    • 9.2.5 Spain
    • 9.2.6 Netherlands
    • 9.2.7 Belgium
    • 9.2.8 Sweden
    • 9.2.9 Switzerland
    • 9.2.10 Poland
    • 9.2.11 Rest of Europe
  • 9.3 Asia Pacific
    • 9.3.1 China
    • 9.3.2 Japan
    • 9.3.3 India
    • 9.3.4 South Korea
    • 9.3.5 Australia
    • 9.3.6 Indonesia
    • 9.3.7 Thailand
    • 9.3.8 Malaysia
    • 9.3.9 Singapore
    • 9.3.10 Vietnam
    • 9.3.11 Rest of Asia Pacific
  • 9.4 South America
    • 9.4.1 Brazil
    • 9.4.2 Argentina
    • 9.4.3 Colombia
    • 9.4.4 Chile
    • 9.4.5 Peru
    • 9.4.6 Rest of South America
  • 9.5 Rest of the World (RoW)
    • 9.5.1 Middle East
      • 9.5.1.1 Saudi Arabia
      • 9.5.1.2 United Arab Emirates
      • 9.5.1.3 Qatar
      • 9.5.1.4 Israel
      • 9.5.1.5 Rest of Middle East
    • 9.5.2 Africa
      • 9.5.2.1 South Africa
      • 9.5.2.2 Egypt
      • 9.5.2.3 Morocco
      • 9.5.2.4 Rest of Africa

10 Strategic Market Intelligence

  • 10.1 Industry Value Network and Supply Chain Assessment
  • 10.2 White-Space and Opportunity Mapping
  • 10.3 Product Evolution and Market Life Cycle Analysis
  • 10.4 Channel, Distributor, and Go-to-Market Assessment

11 Industry Developments and Strategic Initiatives

  • 11.1 Mergers and Acquisitions
  • 11.2 Partnerships, Alliances, and Joint Ventures
  • 11.3 New Product Launches and Certifications
  • 11.4 Capacity Expansion and Investments
  • 11.5 Other Strategic Initiatives

12 Company Profiles

  • 12.1 IBM Corporation
  • 12.2 Microsoft Corporation
  • 12.3 Amazon Web Services (AWS)
  • 12.4 NXP Semiconductors
  • 12.5 Thales Group
  • 12.6 IDEMIA
  • 12.7 Palo Alto Networks
  • 12.8 DigiCert
  • 12.9 PQShield
  • 12.10 Post Quantum Ltd.
  • 12.11 ISARA Corporation
  • 12.12 QuintessenceLabs
  • 12.13 Quantum Xchange
  • 12.14 Keyfactor
  • 12.15 QuSecure

List of Tables

  • Table 1 Global Post-Quantum Cryptography Market Outlook, By Region (2023-2034) ($MN)
  • Table 2 Global Post-Quantum Cryptography Market Outlook, By Offering (2023-2034) ($MN)
  • Table 3 Global Post-Quantum Cryptography Market Outlook, By Solutions (2023-2034) ($MN)
  • Table 4 Global Post-Quantum Cryptography Market Outlook, By Encryption Tools (2023-2034) ($MN)
  • Table 5 Global Post-Quantum Cryptography Market Outlook, By Key Management (2023-2034) ($MN)
  • Table 6 Global Post-Quantum Cryptography Market Outlook, By Secure Communication (2023-2034) ($MN)
  • Table 7 Global Post-Quantum Cryptography Market Outlook, By Digital Signatures (2023-2034) ($MN)
  • Table 8 Global Post-Quantum Cryptography Market Outlook, By Services (2023-2034) ($MN)
  • Table 9 Global Post-Quantum Cryptography Market Outlook, By Consulting (2023-2034) ($MN)
  • Table 10 Global Post-Quantum Cryptography Market Outlook, By Integration & Deployment (2023-2034) ($MN)
  • Table 11 Global Post-Quantum Cryptography Market Outlook, By Support & Maintenance (2023-2034) ($MN)
  • Table 12 Global Post-Quantum Cryptography Market Outlook, By Algorithm Type (2023-2034) ($MN)
  • Table 13 Global Post-Quantum Cryptography Market Outlook, By Lattice based (2023-2034) ($MN)
  • Table 14 Global Post-Quantum Cryptography Market Outlook, By Code based (2023-2034) ($MN)
  • Table 15 Global Post-Quantum Cryptography Market Outlook, By Multivariate (2023-2034) ($MN)
  • Table 16 Global Post-Quantum Cryptography Market Outlook, By Hash based (2023-2034) ($MN)
  • Table 17 Global Post-Quantum Cryptography Market Outlook, By Isogeny based (2023-2034) ($MN)
  • Table 18 Global Post-Quantum Cryptography Market Outlook, By Deployment Mode (2023-2034) ($MN)
  • Table 19 Global Post-Quantum Cryptography Market Outlook, By On Premises (2023-2034) ($MN)
  • Table 20 Global Post-Quantum Cryptography Market Outlook, By Cloud (2023-2034) ($MN)
  • Table 21 Global Post-Quantum Cryptography Market Outlook, By Public Cloud (2023-2034) ($MN)
  • Table 22 Global Post-Quantum Cryptography Market Outlook, By Private Cloud (2023-2034) ($MN)
  • Table 23 Global Post-Quantum Cryptography Market Outlook, By Hybrid Cloud (2023-2034) ($MN)
  • Table 24 Global Post-Quantum Cryptography Market Outlook, By End User (2023-2034) ($MN)
  • Table 25 Global Post-Quantum Cryptography Market Outlook, By BFSI (2023-2034) ($MN)
  • Table 26 Global Post-Quantum Cryptography Market Outlook, By Government & Defense (2023-2034) ($MN)
  • Table 27 Global Post-Quantum Cryptography Market Outlook, By IT & Telecom (2023-2034) ($MN)
  • Table 28 Global Post-Quantum Cryptography Market Outlook, By Healthcare (2023-2034) ($MN)
  • Table 29 Global Post-Quantum Cryptography Market Outlook, By Retail & eCommerce (2023-2034) ($MN)
  • Table 30 Global Post-Quantum Cryptography Market Outlook, By Manufacturing (2023-2034) ($MN)
  • Table 31 Global Post-Quantum Cryptography Market Outlook, By Energy & Utilities (2023-2034) ($MN)
  • Table 32 Global Post-Quantum Cryptography Market Outlook, By Other End Users (2023-2034) ($MN)

Note: Tables for North America, Europe, APAC, South America, and Rest of the World (RoW) are also represented in the same manner as above.