{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:20:20Z","timestamp":1743009620128,"version":"3.40.3"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031307300"},{"type":"electronic","value":"9783031307317"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30731-7_2","type":"book-chapter","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T14:03:09Z","timestamp":1680789789000},"page":"22-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Post-quantum Security for the Extended Access Control Protocol"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0597-8297","authenticated-orcid":false,"given":"Marc","family":"Fischlin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2846-5163","authenticated-orcid":false,"given":"Jonas","family":"von der Heyden","sequence":"additional","affiliation":[]},{"given":"Marian","family":"Margraf","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Morgner","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Wallner","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Bock","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,7]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Eisenhofer, T., Kiltz, E., Kunzweiler, S., Riepel, D.: Password-authenticated key exchange from group actions. Cryptology ePrint Archive (2022). https:\/\/eprint.iacr.org\/2022\/770","DOI":"10.1007\/978-3-031-15979-4_24"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Alagic, G., et al.: Status report on the third round of the NIST post-quantum cryptography standardization process, NIST IR 8413. Technical report, National Institute for Standards and Technology (NIST) (2022)","DOI":"10.6028\/NIST.IR.8413"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Angel, Y., Dowling, B., H\u00fclsing, A., Schwabe, P., Weber, F.: Post quantum noise. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, pp. 97\u2013109. ACM (2022)","DOI":"10.1145\/3548606.3560577"},{"issue":"7779","key":"2_CR4","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1038\/s41586-019-1666-5","volume":"574","author":"F Arute","year":"2019","unstructured":"Arute, F., et al.: Quantum supremacy using a programmable superconducting processor. Nature 574(7779), 505\u2013510 (2019)","journal-title":"Nature"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-85230-8_11","volume-title":"Financial Cryptography and Data Security","author":"G Avoine","year":"2008","unstructured":"Avoine, G., Kalach, K., Quisquater, J.-J.: ePassport: securing international contacts with contactless chips. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 141\u2013155. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85230-8_11"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"483","DOI":"10.46586\/tches.v2020.i3.483-507","volume":"2020","author":"F Bache","year":"2020","unstructured":"Bache, F., Paglialonga, C., Oder, T., Schneider, T., G\u00fcneysu, T.: High-speed masking for polynomial comparison in lattice-based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3), 483\u2013507 (2020)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"2_CR7","unstructured":"Bellare, M., Lysyanskaya, A.: Symmetric and dual PRFs from standard assumptions: A generic validation of an HMAC assumption. IACR Cryptology ePrint Archive, p. 1198 (2015). http:\/\/eprint.iacr.org\/2015\/1198"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993, pp. 62\u201373. Association for Computing Machinery (1993)","DOI":"10.1145\/168588.168596"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-32946-3_25","volume-title":"Financial Cryptography and Data Security","author":"J Bender","year":"2012","unstructured":"Bender, J., Dagdelen, \u00d6., Fischlin, M., K\u00fcgler, D.: The PACE$$\\vert $$AA protocol for machine readable travel documents, and its security. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 344\u2013358. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_25"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-04474-8_3","volume-title":"Information Security","author":"J Bender","year":"2009","unstructured":"Bender, J., Fischlin, M., K\u00fcgler, D.: Security analysis of the PACE key-agreement protocol. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 33\u201348. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04474-8_3"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-88702-7_1","volume-title":"Post-Quantum Cryptography","author":"DJ Bernstein","year":"2009","unstructured":"Bernstein, D.J.: Introduction to post-quantum cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 1\u201314. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-540-88702-7_1"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-030-25510-7_12","volume-title":"Post-Quantum Cryptography","author":"N Bindel","year":"2019","unstructured":"Bindel, N., Brendel, J., Fischlin, M., Goncalves, B., Stebila, D.: Hybrid key encapsulation mechanisms and authenticated key exchange. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 206\u2013226. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_12"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-319-59879-6_22","volume-title":"Post-Quantum Cryptography","author":"N Bindel","year":"2017","unstructured":"Bindel, N., Herath, U., McKague, M., Stebila, D.: Transitioning to a quantum-resistant public key infrastructure. In: Lange, T., Takagi, T. (eds.) PQCrypto 2017. LNCS, vol. 10346, pp. 384\u2013405. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59879-6_22"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-23696-0_11","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2019","author":"L Botros","year":"2019","unstructured":"Botros, L., Kannwischer, M.J., Schwabe, P.: Memory-efficient high-speed implementation of Kyber on Cortex-M4. In: Buchmann, J., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2019. LNCS, vol. 11627, pp. 209\u2013228. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23696-0_11"},{"issue":"1","key":"2_CR15","first-page":"639","volume":"64","author":"C Boyd","year":"2019","unstructured":"Boyd, C., Gellert, K.: A modern view on forward security. Comput. J. 64(1), 639\u2013652 (2019)","journal-title":"Comput. J."},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-030-81652-0_16","volume-title":"Selected Areas in Cryptography","author":"J Brendel","year":"2021","unstructured":"Brendel, J., Fischlin, M., G\u00fcnther, F., Janson, C., Stebila, D.: Towards post-quantum security for signal\u2019s X3DH handshake. In: Dunkelman, O., Jacobson, Jr., M.J., O\u2019Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 404\u2013430. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81652-0_16"},{"key":"2_CR17","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: BSI TR-03110. Standard (2016)"},{"key":"2_CR18","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Migration to Post Quantum Cryptography: Recommendations for action by the BSI (2020). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Crypto\/Migration_to_Post_Quantum_Cryptography.pdf?__blob=publicationFile &v=2"},{"key":"2_CR19","unstructured":"Byszio, F., Wirth, K.D., Nguyen, K.: Intelligent composed algorithms. Cryptology ePrint Archive, Paper 2021\/813 (2021). https:\/\/eprint.iacr.org\/2021\/813"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH (preliminary version). Cryptology ePrint Archive (2022)","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-030-03332-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"W Castryck","year":"2018","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018, Part III. LNCS, vol. 11274, pp. 395\u2013427. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_15"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-18178-8_6","volume-title":"Information Security","author":"\u00d6 Dagdelen","year":"2011","unstructured":"Dagdelen, \u00d6., Fischlin, M.: Security analysis of the extended access control protocol for machine readable travel documents. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 54\u201368. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18178-8_6"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-030-29959-0_28","volume-title":"Computer Security \u2013 ESORICS 2019","author":"I Filimonov","year":"2019","unstructured":"Filimonov, I., Horne, R., Mauw, S., Smith, Z.: Breaking unlinkability of the ICAO 9303 standard for e-passports using bisimilarity. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019, Part I. LNCS, vol. 11735, pp. 577\u2013594. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29959-0_28"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Fischlin, M., G\u00fcnther, F., Schmidt, B., Warinschi, B.: Key confirmation in key exchange: a formal treatment and implications for TLS 1.3. In: IEEE Symposium on Security and Privacy, SP 2016, pp. 452\u2013469. IEEE Computer Society (2016)","DOI":"10.1109\/SP.2016.34"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-319-76578-5_7","volume-title":"Public-Key Cryptography \u2013 PKC 2018","author":"F Giacon","year":"2018","unstructured":"Giacon, F., Heuer, F., Poettering, B.: KEM combiners. In: Abdalla, M., Dahab, R. (eds.) PKC 2018. LNCS, vol. 10769, pp. 190\u2013218. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76578-5_7"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 516\u2013525. Association for Computing Machinery (2010)","DOI":"10.1145\/1866307.1866365"},{"key":"2_CR27","unstructured":"Heinz, D., P\u00f6ppelmann, T.: Combined fault and DPA protection for lattice-based cryptography. IACR Cryptology ePrint Archive, p. 101 (2021). https:\/\/eprint.iacr.org\/2021\/101"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"H\u00fclsing, A., Butin, D., Gazdag, S., Rijneveld, J., Mohaisen, A.: XMSS: eXtended merkle signature scheme (2018)","DOI":"10.17487\/RFC8391"},{"key":"2_CR29","unstructured":"H\u00fclsing, A., et al.: SPHINCS+. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"H\u00fclsing, A., Ning, K., Schwabe, P., Weber, F., Zimmermann, P.R.: Post-quantum wireguard. In: 42nd IEEE Symposium on Security and Privacy, SP 2021, pp. 304\u2013321. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00030"},{"key":"2_CR31","unstructured":"International Civil Aviation Organization: ICAO doc 9303. Standard (2021). https:\/\/www.icao.int\/publications\/pages\/publication.aspx?docnum=9303. 8th Edition"},{"key":"2_CR32","unstructured":"International Organization for Standardization\/International Electrotechnical Commission: ISO\/IEC 14443\u20134: Identification cards - contactless integrated circuit cards - proximity cards. Standard (2018)"},{"key":"2_CR33","unstructured":"International Organization for Standardization\/International Electrotechnical Commission: ISO\/IEC 7816\u20134: Identification cards - integrated circuit cards. Technical report (2020)"},{"key":"2_CR34","unstructured":"Kannwischer, M.J., et al.: Pqm4 (2022). https:\/\/github.com\/mupq\/pqm4\/blob\/master\/benchmarks.md"},{"key":"2_CR35","doi-asserted-by":"publisher","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2014","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. CRC Press, Boca Raton (2014)","edition":"2"},{"key":"2_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1007\/978-3-642-10366-7_37","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"J Katz","year":"2009","unstructured":"Katz, J., Vaikuntanathan, V.: Smooth projective hashing and password-based authenticated key exchange from lattices. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 636\u2013652. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_37"},{"key":"2_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: the \u2018SIGn-and-MAc\u2019 approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400\u2013425. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_24"},{"key":"2_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_34"},{"key":"2_CR39","unstructured":"Lamport, L.: Constructing digital signatures from a one-way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory (1979)"},{"key":"2_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/978-3-540-76843-2_30","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"Y Liu","year":"2007","unstructured":"Liu, Y., Kasper, T., Lemke-Rust, K., Paar, C.: E-passport: cracking basic access control Keys. In: Meersman, R., Tari, Z. (eds.) OTM 2007. LNCS, vol. 4804, pp. 1531\u20131547. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-76843-2_30"},{"key":"2_CR41","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-DILITHIUM. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"2_CR42","unstructured":"MATZOV: Report on the Security of LWE: Improved Dual Lattice Attack (2022)"},{"key":"2_CR43","doi-asserted-by":"publisher","unstructured":"McGrew, D., Curcio, M., Fluhrer, S.: Leighton-Micali hash-based signatures. https:\/\/doi.org\/10.17487\/RFC8554","DOI":"10.17487\/RFC8554"},{"key":"2_CR44","unstructured":"Merkle, R.C.: Secrecy, authentication and public key systems. Ph.D. thesis (1979). https:\/\/www.merkle.com\/papers\/Thesis1979.pdf"},{"key":"2_CR45","unstructured":"Morgner, F., von der Heyden, J.: Analyzing requirements for post quantum secure machine readable travel documents. In: Open Identity Summit 2021, pp. 205\u2013210. Gesellschaft f\u00fcr Informatik e.V. (2021)"},{"key":"2_CR46","unstructured":"Mosca, M.: Cybersecurity in an era with quantum computers: will we be ready? Cryptology ePrint Archive, Paper 2015\/1075 (2015). https:\/\/eprint.iacr.org\/2015\/1075"},{"key":"2_CR47","unstructured":"National Institute of Standards and Technology (NIST): Recommendation for stateful hash-based signature schemes, SP 800-208. Standard (2020)"},{"issue":"1","key":"2_CR48","doi-asserted-by":"publisher","first-page":"142","DOI":"10.46586\/tches.v2018.i1.142-174","volume":"2018","author":"T Oder","year":"2018","unstructured":"Oder, T., Schneider, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Practical cca2-secure and masked ring-LWE implementation. IACR TCHES 2018(1), 142\u2013174 (2018)","journal-title":"IACR TCHES"},{"key":"2_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-030-66504-3_4","volume-title":"Computer Security","author":"G Pradel","year":"2020","unstructured":"Pradel, G., Mitchell, C.: Post-quantum certificates for electronic travel documents. In: Boureanu, I., et al. (eds.) ESORICS 2020. LNCS, vol. 12580, pp. 56\u201373. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66504-3_4"},{"key":"2_CR50","unstructured":"Prest, T., et al.: FALCON. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"2_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-66626-2_7","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"P Ravi","year":"2020","unstructured":"Ravi, P., Poussier, R., Bhasin, S., Chattopadhyay, A.: On configurable SCA countermeasures against single trace attacks for the NTT - a performance evaluationstudy over Kyber and Dilithium on the ARM Cortex-M4. In: Batina, L., Picek, S., Mondal, M. (eds.) SPACE 2020. LNCS, vol. 12586, pp. 123\u2013146. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66626-2_7"},{"issue":"1","key":"2_CR52","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s13389-017-0149-6","volume":"8","author":"MO Saarinen","year":"2018","unstructured":"Saarinen, M.O.: Arithmetic coding and blinding countermeasures for lattice signatures - engineering a side-channel resistant post-quantum signature scheme with compact signatures. J. Cryptogr. Eng. 8(1), 71\u201384 (2018)","journal-title":"J. Cryptogr. Eng."},{"key":"2_CR53","unstructured":"Schanck, J.M., Stebila, D.: A transport layer security (TLS) extension for establishing an additional shared secret. Internet-Draft draft-schanck-tls-additional-keyshare-00, Internet Engineering Task Force (2017). https:\/\/datatracker.ietf.org\/doc\/draft-schanck-tls-additional-keyshare\/00\/. Work in Progress"},{"key":"2_CR54","unstructured":"Schwabe, P., et al.: CRYSTALS-KYBER. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"2_CR55","doi-asserted-by":"crossref","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: Post-quantum TLS without handshake signatures. In: CCS 2020: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, 9\u201313 November 2020, pp. 1461\u20131480. ACM (2020)","DOI":"10.1145\/3372297.3423350"},{"key":"2_CR56","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE Computer Society Press (1994)"},{"key":"2_CR57","unstructured":"Vogt, S., Funke, H.: How quantum computers threat security of PKIs and thus EIDs. In: Open Identity Summit 2021, pp. 83\u201394. Gesellschaft f\u00fcr Informatik e.V. (2021)"},{"issue":"3","key":"2_CR58","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265\u2013279 (1981)","journal-title":"J. Comput. Syst. Sci."},{"key":"2_CR59","unstructured":"Wenger, E., Chen, M., Charton, F., Lauter, K.: SALSA: attacking lattice cryptography with transformers. Cryptology ePrint Archive, Paper 2022\/935 (2022). https:\/\/eprint.iacr.org\/2022\/935"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30731-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,10]],"date-time":"2023-12-10T09:17:49Z","timestamp":1702199869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30731-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031307300","9783031307317"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30731-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lyon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eurocrypt.iacr.org\/2023\/affiliated.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}