{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T06:24:37Z","timestamp":1770531877385,"version":"3.49.0"},"publisher-location":"Cham","reference-count":102,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031307300","type":"print"},{"value":"9783031307317","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-30731-7_4","type":"book-chapter","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T14:03:09Z","timestamp":1680789789000},"page":"78-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Vision Paper: Do We Need to Change Some Things?"],"prefix":"10.1007","author":[{"given":"Panos","family":"Kampanakis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3796-042X","authenticated-orcid":false,"given":"Tancr\u00e8de","family":"Lepoint","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,7]]},"reference":[{"key":"4_CR1","unstructured":"Abdalla, M., Haase, B., Hesse, J.: CPace, a balanced composable PAKE. Technical report, Internet Research Task Force (2022). https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-cpace\/"},{"key":"4_CR2","unstructured":"Agrawal, S., Kirshanova, E., Stehle, D., Yadav, A.: Can round-optimal lattice-based blind signatures be practical? Cryptology ePrint Archive, Report 2021\/1565 (2021). https:\/\/ia.cr\/2021\/1565"},{"key":"4_CR3","unstructured":"Aguilar Melchor, C., et al.: HQC. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-4-submissions"},{"key":"4_CR4","unstructured":"Albrecht, M.R., et al.: Classic McEliece. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-4-submissions"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-030-75248-4_10","volume-title":"Public-Key Cryptography \u2013 PKC 2021","author":"MR Albrecht","year":"2021","unstructured":"Albrecht, M.R., Davidson, A., Deo, A., Smart, N.P.: Round-optimal verifiable oblivious pseudorandom functions from ideal lattices. In: Garay, J.A. (ed.) PKC 2021. LNCS, vol. 12711, pp. 261\u2013289. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75248-4_10"},{"key":"4_CR6","unstructured":"American National Standards Institute Inc: ANSI X9.44-2007 key establishment using integer factorization cryptography (2007). https:\/\/webstore.ansi.org\/standards\/ascx9\/ansix9442007r2017"},{"key":"4_CR7","unstructured":"Anastasova, M., Kampanakis, P., Massimo, J.: PQ-HPKE: post-quantum hybrid public key encryption. In: International Cryptographic Module Conference 2022 (2022). https:\/\/ia.cr\/2022\/414"},{"key":"4_CR8","unstructured":"American National Standards Institute (ANSI) X9.F1 subcommittee. ANSI X9.63 Public key cryptography for the Financial Services Industry: Elliptic curve key agreement and key transport schemes, 5 July 1998. working draft version 2.0"},{"key":"4_CR9","unstructured":"Aragon, N., et al.: BIKE. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-4-submissions"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Barnes, R., Bhargavan, K., Lipp, B., Wood, C.A.: Hybrid public key encryption. RFC, Internet Engineering Task Force (2022). https:\/\/www.rfc-editor.org\/rfc\/rfc9180","DOI":"10.17487\/RFC9180"},{"key":"4_CR11","unstructured":"Bas Westerbaan, C.: Sizing Up Post-Quantum Signatures, November 2021. https:\/\/blog.cloudflare.com\/sizing-up-post-quantum-signatures\/"},{"key":"4_CR12","unstructured":"Basso, A.: A post-quantum round-optimal oblivious PRF from isogenies. Cryptology ePrint Archive, Paper 2023\/225 (2023). https:\/\/eprint.iacr.org\/2023\/225"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-77870-5_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"F Benhamouda","year":"2021","unstructured":"Benhamouda, F., Lepoint, T., Loss, J., Orr\u00f9, M., Raykova, M.: On the (in)security of ROS. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 33\u201353. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_2"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/978-3-030-64834-3_18","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"D Boneh","year":"2020","unstructured":"Boneh, D., Kogan, D., Woo, K.: Oblivious pseudorandom functions from isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12492, pp. 520\u2013550. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_18"},{"key":"4_CR15","unstructured":"Bourdrez, D., Krawczyk, D.H., Lewi, K., Wood, C.A.: The OPAQUE asymmetric PAKE protocol. Technical report, Internet Research Task Force (2022). https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-opaque\/"},{"key":"4_CR16","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH (preliminary version). Cryptology ePrint Archive, Report 2022\/975 (2022). https:\/\/ia.cr\/2022\/975"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Chairattana-Apirom, R., Hanzlik, L., Loss, J., Lysyanskaya, A., Wagner, B.: PI-cut-choo and friends: compact blind signatures via parallel instance cut-and-choose and more. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022, Part III. LNCS, vol. 13509, pp. 3\u201331. Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 15\u201318 August 2022. https:\/\/doi.org\/10.1007\/978-3-031-15982-4_1","DOI":"10.1007\/978-3-031-15982-4_1"},{"key":"4_CR18","unstructured":"Chairattana-Apirom, R., Lysyanskaya, A.: Compact cut-and-choose: boosting the security of blind signature schemes, compactly. Cryptology ePrint Archive, Report 2022\/003 (2022). https:\/\/ia.cr\/2022\/003"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Chu, J., Dukkipati, N., Cheng, Y., Mathis, M.: Increasing TCP\u2019s Initial Window. RFC 6928, April 2013. https:\/\/www.rfc-editor.org\/info\/rfc6928","DOI":"10.17487\/rfc6928"},{"key":"4_CR20","unstructured":"Davidson, A., Faz-Hernandez, A., Sullivan, N., Wood, C.A.: Oblivious pseudorandom functions (OPRFs) using prime-order groups. Technical report, Internet Research Task Force (2022). https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-voprf\/"},{"issue":"3","key":"4_CR21","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1515\/popets-2018-0026","volume":"2018","author":"A Davidson","year":"2018","unstructured":"Davidson, A., Goldberg, I., Sullivan, N., Tankersley, G., Valsorda, F.: Privacy pass: bypassing internet challenges anonymously. PoPETs 2018(3), 164\u2013180 (2018). https:\/\/doi.org\/10.1515\/popets-2018-0026","journal-title":"PoPETs"},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"del Pino, R., Katsumata, S.: A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022, Part II. LNCS, vol. 13508, pp. 306\u2013336. Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 15\u201318 August 2022. https:\/\/doi.org\/10.1007\/978-3-031-15979-4_11","DOI":"10.1007\/978-3-031-15979-4_11"},{"key":"4_CR23","unstructured":"Denis, F., Jacobs, F., Wood, C.A.: RSA blind signatures. Technical report, Internet Research Task Force (2022). https:\/\/datatracker.ietf.org\/doc\/draft-irtf-cfrg-rsa-blind-signatures\/"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-40974-8_12","volume-title":"Cryptography and Coding","author":"AW Dent","year":"2003","unstructured":"Dent, A.W.: A designer\u2019s guide to KEMs. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 133\u2013151. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40974-8_12"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Dukkipati, N., et al.: An argument for increasing TCP\u2019s initial congestion window. SIGCOMM Comput. Commun. Rev. 40(3), 26\u201333 (2010). https:\/\/doi.org\/10.1145\/1823844.1823848","DOI":"10.1145\/1823844.1823848"},{"key":"4_CR26","unstructured":"Durak, F.B., Vaudenay, S., Chase, M.: Anonymous tokens with hidden metadata bit from algebraic macs. Cryptology ePrint Archive, Paper 2022\/1622 (2022). https:\/\/ia.cr\/2022\/1622"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/978-3-030-81293-5_9","volume-title":"Post-Quantum Cryptography","author":"E Eaton","year":"2021","unstructured":"Eaton, E., Stebila, D.: The quantum annoying property of\u00a0password-authenticated key exchange\u00a0protocols. In: Cheon, J.H., Tillich, J.-P. (eds.) PQCrypto 2021 2021. LNCS, vol. 12841, pp. 154\u2013173. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81293-5_9"},{"key":"4_CR28","unstructured":"ETSI: ETSI TC Cyber Working Group for Quantum-Safe Cryptography (2017). https:\/\/portal.etsi.org\/TBSiteMap\/CYBER\/CYBERQSCToR.aspx. Accessed 25 July 2019"},{"key":"4_CR29","unstructured":"Fregly, A., Harvey, J., Jr., B.S.K., Sheth, S.: Merkle tree ladder mode: reducing the size impact of NIST PQC signature algorithms in practice. Cryptology ePrint Archive, Paper 2022\/1730 (2022). https:\/\/ia.cr\/2022\/1730"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"E Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537\u2013554. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_34"},{"issue":"1","key":"4_CR31","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s00145-011-9114-1","volume":"26","author":"E Fujisaki","year":"2011","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. J. Cryptol. 26(1), 80\u2013101 (2011). https:\/\/doi.org\/10.1007\/s00145-011-9114-1","journal-title":"J. Cryptol."},{"key":"4_CR32","unstructured":"Gao, X., Ding, J., Liu, J., Li, L.: Post-quantum secure remote password protocol from RLWE problem. Cryptology ePrint Archive, Report 2017\/1196 (2017). https:\/\/ia.cr\/2017\/1196"},{"key":"4_CR33","doi-asserted-by":"publisher","unstructured":"Gayoso Mart\u00ednez, V., Hern\u00e1ndez \u00c1 lvarez, F., Hern\u00e1ndez Encinas, L., S\u00e1nchez \u00c1 vila, C.: A comparison of the standardized versions of ECIES. In: 2010 Sixth International Conference on Information Assurance and Security, pp. 1\u20134 (2010). https:\/\/doi.org\/10.1109\/ISIAS.2010.5604194","DOI":"10.1109\/ISIAS.2010.5604194"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Ghedini, A., Vasiliev, V.: TLS Certificate Compression. RFC 8879, December 2020. https:\/\/doi.org\/10.17487\/RFC8879, https:\/\/www.rfc-editor.org\/info\/rfc8879","DOI":"10.17487\/RFC8879"},{"key":"4_CR35","doi-asserted-by":"publisher","unstructured":"Goertzen, J., Stebila, D.: Post-quantum signatures in DNSSEC via request-based fragmentation. CoRR abs\/2211.14196 (2022). https:\/\/doi.org\/10.48550\/arXiv.2211.14196","DOI":"10.48550\/arXiv.2211.14196"},{"key":"4_CR36","unstructured":"Hanzlik, L., Loss, J., Wagner, B.: Rai-choo! Evolving blind signatures to the next level. Cryptology ePrint Archive, Report 2022\/1350 (2022). https:\/\/ia.cr\/2022\/1350"},{"key":"4_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-030-17659-4_12","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"E Hauck","year":"2019","unstructured":"Hauck, E., Kiltz, E., Loss, J.: A modular treatment of blind signatures from identification schemes. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11478, pp. 345\u2013375. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17659-4_12"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-030-56880-1_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"E Hauck","year":"2020","unstructured":"Hauck, E., Kiltz, E., Loss, J., Nguyen, N.K.: Lattice-based blind signatures, revisited. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12171, pp. 500\u2013529. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56880-1_18"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"Housley, R.: Use of the HSS\/LMS Hash-Based Signature Algorithm in the Cryptographic Message Syntax (CMS). RFC 8708, February 2020. https:\/\/www.rfc-editor.org\/info\/rfc8708","DOI":"10.17487\/RFC8708"},{"key":"4_CR40","unstructured":"http archive: Report: State of the Web. http:\/\/httparchive.org\/trends.php"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Huelsing, A., Butin, D., Gazdag, S.L., Rijneveld, J., Mohaisen, A.: XMSS: eXtended Merkle Signature Scheme. RFC 8391, May 2018. https:\/\/rfc-editor.org\/rfc\/rfc8391","DOI":"10.17487\/RFC8391"},{"key":"4_CR42","unstructured":"Hulsing, A.,et al.: SPHINCS+. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"4_CR43","unstructured":"IEEE draft standard P1363.2. Password-based public key cryptography, May 2004. draft Version 15. http:\/\/grouper.ieee.org\/groups\/1363\/passwdPK"},{"key":"4_CR44","unstructured":"IEEE P1363a Committee. IEEE P1363a \/ D9 \u2013 standard specifications for public key cryptography: Additional techniques, June 2001. draft Version 9. http:\/\/grouper.ieee.org\/groups\/1363\/index.html\/"},{"key":"4_CR45","unstructured":"ISO: Information technology - security techniques - key management - part 4: Mechanisms based on weak secrets. ISO\/IEC, International Organization for Standardization (2017). https:\/\/www.iso.org\/standard\/67933.html"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Iyengar, J., Swett, I.: QUIC Loss Detection and Congestion Control. RFC 9002, May 2021. https:\/\/www.rfc-editor.org\/info\/rfc9002","DOI":"10.17487\/RFC9002"},{"key":"4_CR47","unstructured":"Jao, D., et al.: SIKE. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-4-submissions"},{"key":"4_CR48","unstructured":"Jao, D., et al.: SIKE. Technical report, National Institute of Standards and Technology (2020). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3-submissions"},{"key":"4_CR49","unstructured":"Jaques, S.: Landscape of quantum computing in 2022 (2022). https:\/\/sam-jaques.appspot.com\/quantum_landscape_2022"},{"key":"4_CR50","unstructured":"Jivsov, A.: Elliptic curve cryptography (ECC) in OpenPGP. RFC, Internet Engineering Task Force (2016). https:\/\/www.rfc-editor.org\/rfc\/rfc6637"},{"key":"4_CR51","doi-asserted-by":"crossref","unstructured":"Jonsson, J., Kaliski, B.: Public-key cryptography standards (PKCS) #1: RSA cryptography specifications version 2.1. RFC, Internet Engineering Task Force (2003). https:\/\/www.rfc-editor.org\/rfc\/rfc3447","DOI":"10.17487\/rfc3447"},{"key":"4_CR52","unstructured":"K. Moriarty, E., Kaliski, B., Jonsson, J., Rusch, A.: PKCS #1: RSA cryptography specifications version 2.2. RFC, Internet Engineering Task Force (2012). https:\/\/www.rfc-editor.org\/rfc\/rfc8017"},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS #1: RSA encryption version 1.5. RFC, Internet Engineering Task Force (1998). https:\/\/www.rfc-editor.org\/rfc\/rfc2313","DOI":"10.17487\/rfc2313"},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"Kaliski, B., Jonsson, J.: PKCS #1: RSA cryptography specifications version 2.0. RFC, Internet Engineering Task Force (1998). https:\/\/www.rfc-editor.org\/rfc\/rfc2437","DOI":"10.17487\/rfc2437"},{"key":"4_CR55","doi-asserted-by":"publisher","unstructured":"Kampanakis, P., Kallitsis, M.: Faster post-quantum TLS handshakes without intermediate CA certificates. In: Dolev, S., Katz, J., Meisels, A. (eds.) Cyber Security, Cryptology, and Machine Learning. CSCML 2022. LNCS, vol. 13301, pp. 337\u2013355. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07689-3_25","DOI":"10.1007\/978-3-031-07689-3_25"},{"key":"4_CR56","unstructured":"Kampanakis, P., Sikeridis, D.: Two PQ signature use-cases: Non-issues, challenges and potential solutions. Cryptology ePrint Archive, Report 2019\/1276 (2019). https:\/\/ia.cr\/2019\/1276"},{"key":"4_CR57","unstructured":"Kampanakis, P., Stebila, D., Hansen, T.: Post-quantum Hybrid Key Exchange in SSH. Internet-Draft draft-kampanakis-curdle-ssh-pq-ke-00, Internet Engineering Task Force, November 2022. work in Progress. https:\/\/datatracker.ietf.org\/doc\/draft-kampanakis-curdle-ssh-pq-ke\/00\/"},{"key":"4_CR58","doi-asserted-by":"crossref","unstructured":"Kastner, J., Loss, J., Xu, J.: The abe-okamoto partially blind signature scheme revisited. Cryptology ePrint Archive, Report 2022\/1232 (2022). https:\/\/ia.cr\/2022\/1232","DOI":"10.1007\/978-3-031-22972-5_10"},{"key":"4_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/978-3-030-92068-5_16","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"J Katz","year":"2021","unstructured":"Katz, J., Loss, J., Rosenberg, M.: Boosting the\u00a0security of\u00a0blind signature schemes. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13093, pp. 468\u2013492. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92068-5_16"},{"key":"4_CR60","doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P.E., Nir, Y., Eronen, P., Kivinen, T.: Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7296, October 2014. https:\/\/www.rfc-editor.org\/info\/rfc7296","DOI":"10.17487\/rfc7296"},{"key":"4_CR61","doi-asserted-by":"crossref","unstructured":"Kinnear, E., McManus, P., Pauly, T., Verma, T., Wood, C.A.: Oblivious DNS over HTTPS. RFC, Internet Engineering Task Force (2022). https:\/\/www.rfc-editor.org\/rfc\/rfc9230","DOI":"10.17487\/RFC9230"},{"key":"4_CR62","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-030-56784-2_11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"B Kreuter","year":"2020","unstructured":"Kreuter, B., Lepoint, T., Orr\u00f9, M., Raykova, M.: Anonymous tokens with private metadata bit. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12170, pp. 308\u2013336. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_11"},{"key":"4_CR63","unstructured":"Kris Kwiatkowski, L.V.: The TLS Post-Quantum Experiment, October 2020. https:\/\/blog.cloudflare.com\/the-tls-post-quantum-experiment\/"},{"key":"4_CR64","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-DILITHIUM. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"4_CR65","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Nguyen, N.K., Plancon, M.: Efficient lattice-based blind signatures via gaussian one-time signatures. Cryptology ePrint Archive, Report 2022\/006 (2022). https:\/\/ia.cr\/2022\/006","DOI":"10.1007\/978-3-030-97131-1_17"},{"key":"4_CR66","unstructured":"Maino, L., Martindale, C.: An attack on SIDH with arbitrary starting curve. Cryptology ePrint Archive, Report 2022\/1026 (2022). https:\/\/ia.cr\/2022\/1026"},{"key":"4_CR67","unstructured":"Majkowski, M.: Reflections on reflection (attacks), May 2017. https:\/\/blog.cloudflare.com\/reflections-on-reflections\/"},{"key":"4_CR68","unstructured":"Massimo, J., Kampanakis, P., Turner, S., Westerbaan, B.: Internet X.509 Public Key Infrastructure: Algorithm Identifiers for Dilithium. Internet-Draft draft-ietf-lamps-dilithium-certificates-00, Internet Engineering Task Force, September 2022. work in Progress. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-lamps-dilithium-certificates\/00\/"},{"key":"4_CR69","doi-asserted-by":"crossref","unstructured":"McGrew, D., Curcio, M., Fluhrer, S.: Leighton-Micali Hash-Based Signatures. RFC 8554, April 2019. https:\/\/rfc-editor.org\/rfc\/rfc8554","DOI":"10.17487\/RFC8554"},{"key":"4_CR70","unstructured":"Mononen, T., Kause, T., Farrell, S., Adams, D.C.: Internet X.509 public key infrastructure certificate management protocol (CMP). RFC, Internet Engineering Task Force (2005). https:\/\/www.rfc-editor.org\/rfc\/rfc4210"},{"key":"4_CR71","doi-asserted-by":"publisher","unstructured":"M\u00fcller, M., de Jong, J., van Heesch, M., Overeinder, B., van Rijswijk-Deij, R.: Retrofitting post-quantum cryptography in internet protocols: a case study of DNSSEC. SIGCOMM Comput. Commun. Rev. 50(4), 49\u201357 (2020). https:\/\/doi.org\/10.1145\/3431832.3431838","DOI":"10.1145\/3431832.3431838"},{"key":"4_CR72","doi-asserted-by":"publisher","unstructured":"Nawrocki, M., Tehrani, P.F., Hiesgen, R., M\u00fccke, J., Schmidt, T.C., W\u00e4hlisch, M.: On the interplay between TLS certificates and QUIC performance. In: Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies. ACM, November 2022. https:\/\/doi.org\/10.1145\/3555050.3569123","DOI":"10.1145\/3555050.3569123"},{"key":"4_CR73","unstructured":"NIST: NIST PQ project, February 2022. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography"},{"key":"4_CR74","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-030-44223-1_5","volume-title":"Post-Quantum Cryptography","author":"C Paquin","year":"2020","unstructured":"Paquin, C., Stebila, D., Tamvada, G.: Benchmarking post-quantum cryptography in TLS. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 72\u201391. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_5"},{"key":"4_CR75","unstructured":"Partridge, D.C., Allman, M., Floyd, S.: Increasing TCP\u2019s Initial Window. RFC 3390, November 2002. https:\/\/www.rfc-editor.org\/info\/rfc3390"},{"key":"4_CR76","unstructured":"Paxson, D.V., Allman, M., Stevens, W.R.: TCP Congestion Control. RFC 2581, April 1999. https:\/\/www.rfc-editor.org\/info\/rfc2581"},{"key":"4_CR77","unstructured":"Planet, C.: Initcwnd settings of major CDN providers, February 2017. https:\/\/www.cdnplanet.com\/blog\/initcwnd-settings-major-cdn-providers\/"},{"key":"4_CR78","unstructured":"Prest, T., et al.: FALCON. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"4_CR79","unstructured":"Prince, M.: The DDoS That Almost Broke the Internet, May 2017. https:\/\/blog.cloudflare.com\/the-ddos-that-almost-broke-the-internet\/"},{"key":"4_CR80","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, August 2018. https:\/\/rfc-editor.org\/rfc\/rfc8446","DOI":"10.17487\/RFC8446"},{"key":"4_CR81","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Modadugu, N.: Datagram Transport Layer Security Version 1.2. RFC 6347, January 2012. https:\/\/www.rfc-editor.org\/info\/rfc6347","DOI":"10.17487\/rfc6347"},{"key":"4_CR82","unstructured":"Rescorla, E., Oku, K., Sullivan, N., Wood, C.A.: TLS encrypted client hello. Technical report, Internet Engineering Task Force (2022). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-esni\/"},{"key":"4_CR83","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Tschofenig, H., Modadugu, N.: The Datagram Transport Layer Security (DTLS) Protocol Version 1.3. RFC 9147, April 2022. https:\/\/www.rfc-editor.org\/info\/rfc9147","DOI":"10.17487\/RFC9147"},{"key":"4_CR84","doi-asserted-by":"publisher","unstructured":"Rossow, C.: Amplification hell: revisiting network protocols for ddos abuse, January 2014. https:\/\/doi.org\/10.14722\/ndss.2014.23233","DOI":"10.14722\/ndss.2014.23233"},{"key":"4_CR85","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-3-642-17373-8_24","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"M R\u00fcckert","year":"2010","unstructured":"R\u00fcckert, M.: Lattice-based blind signatures. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 413\u2013430. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_24"},{"key":"4_CR86","doi-asserted-by":"publisher","unstructured":"R\u00fcth, J., Bormann, C., Hohlfeld, O.: Large-scale scanning of TCP\u2019s initial window. In: Proceedings of the 2017 Internet Measurement Conference, pp. 304\u2013310. IMC 2017, Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3131365.3131370","DOI":"10.1145\/3131365.3131370"},{"key":"4_CR87","unstructured":"Schwabe, P., et al.: CRYSTALS-KYBER. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"4_CR88","unstructured":"Certicom research, standards for efficient cryptography group (SECG) \u2013 sec 1: Elliptic curve cryptography, 20 September 2000. version 1.0. http:\/\/www.secg.org\/secg_docs.htm"},{"key":"4_CR89","unstructured":"Shoup, V.: A proposal for an ISO standard for public key encryption. Cryptology ePrint Archive, Report 2001\/112 (2001). https:\/\/ia.cr\/2001\/112"},{"key":"4_CR90","unstructured":"Shoup, V.: ISO 18033\u20132: an emerging standard for public-key encryption, December 2004. final Committee Draft. https:\/\/shoup.net\/iso\/std6.pdf"},{"key":"4_CR91","doi-asserted-by":"publisher","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In: Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies, pp. 149\u2013156. CoNEXT 2020, Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3386367.3431305","DOI":"10.1145\/3386367.3431305"},{"key":"4_CR92","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: a performance study. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 23\u201326 February 2020. The Internet Society (2020). https:\/\/www.ndss-symposium.org\/ndss-paper\/post-quantum-authentication-in-tls-1-3-a-performance-study\/","DOI":"10.14722\/ndss.2020.24203"},{"key":"4_CR93","doi-asserted-by":"crossref","unstructured":"Smyslov, V.: Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 9242, May 2022. https:\/\/www.rfc-editor.org\/info\/rfc9242","DOI":"10.17487\/RFC9242"},{"key":"4_CR94","unstructured":"Stebila, D., Fluhrer, S., Gueron, S.: Hybrid key exchange in TLS 1.3. Internet-Draft draft-ietf-tls-hybrid-design-04, Internet Engineering Task Force, January 2022. work in Progress. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-hybrid-design-04"},{"key":"4_CR95","unstructured":"Stebila, D., Fluhrer, S., Gueron, S.: Hybrid key exchange in TLS 1.3. Internet-Draft draft-ietf-tls-hybrid-design-05, Internet Engineering Task Force, August 2022. work in Progress. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-hybrid-design\/05\/"},{"key":"4_CR96","doi-asserted-by":"crossref","unstructured":"Stevens, W.R.: TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms. RFC 2001, January 1997. https:\/\/www.rfc-editor.org\/info\/rfc2001","DOI":"10.17487\/rfc2001"},{"key":"4_CR97","unstructured":"Thomson, M., Kampanakis, P., Bytheway, C., Westerbaan, B.: Suppressing CA Certificates in TLS 1.3. Internet-Draft draft-kampanakis-tls-scas-latest-02, Internet Engineering Task Force, July 2022. work in Progress. https:\/\/datatracker.ietf.org\/doc\/draft-kampanakis-tls-scas-latest\/02\/"},{"key":"4_CR98","doi-asserted-by":"crossref","unstructured":"Thomson, M., Turner, S.: Using TLS to Secure QUIC. RFC 9001, May 2021. https:\/\/www.rfc-editor.org\/info\/rfc9001","DOI":"10.17487\/RFC9001"},{"key":"4_CR99","unstructured":"Tjhai, C., et al.: Multiple key exchanges in IKEv2. Internet-Draft draft-ietf-ipsecme-ikev2-multiple-ke-04, Internet Engineering Task Force, September 2021. work in Progress. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-ipsecme-ikev2-multiple-ke-04"},{"key":"4_CR100","unstructured":"Tjhai, C., et al.: Multiple key exchanges in IKEv2. Internet-Draft draft-ietf-ipsecme-ikev2-multiple-ke-12, Internet Engineering Task Force, December 2022. work in Progress. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-ipsecme-ikev2-multiple-ke\/12\/"},{"key":"4_CR101","unstructured":"Touch, D.J.D.: Automating the Initial Window in TCP. Internet-Draft draft-touch-tcpm-automatic-iw-03, Internet Engineering Task Force, July 2012. work in Progress. https:\/\/datatracker.ietf.org\/doc\/draft-touch-tcpm-automatic-iw\/03\/"},{"key":"4_CR102","doi-asserted-by":"crossref","unstructured":"Wu, T.: The SRP authentication and key exchange system. RFC, Internet Engineering Task Force (2000). https:\/\/www.rfc-editor.org\/rfc\/rfc2945","DOI":"10.17487\/rfc2945"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30731-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T14:05:11Z","timestamp":1680789911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30731-7_4"}},"subtitle":["Open Questions Posed by the Upcoming Post-quantum Migration to Existing Standards and Deployments"],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031307300","9783031307317"],"references-count":102,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30731-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"7 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lyon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eurocrypt.iacr.org\/2023\/affiliated.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}