{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:19:43Z","timestamp":1772644783361,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031875403","type":"print"},{"value":"9783031875410","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87541-0_1","type":"book-chapter","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:59:27Z","timestamp":1744203567000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Standardisation of\u00a0and\u00a0Migration to\u00a0Post-Quantum Cryptography"],"prefix":"10.1007","author":[{"given":"Liqun","family":"Chen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"1_CR1","unstructured":"Netherlands National Communications\u00a0Security Agency. The PQC migration handbook, 2023. https:\/\/english.aivd.nl\/publications\/publications\/2023\/04\/04\/the-pqc-migration-handbook"},{"key":"1_CR2","unstructured":"ANSI. ANSI X9.95-2022: Time stamp management and security"},{"key":"1_CR3","unstructured":"European Commission. Commission publishes recommendation on post-quantum cryptography, 2024. https:\/\/digital-strategy.ec.europa.eu\/en\/news\/commission-publishes-recommendation-post-quantum-cryptography"},{"key":"1_CR4","unstructured":"ETSI. ETSI TS 103 744 v1.1.1 (2020-12), CYBER; Quantum-safe hybrid key exchanges. https:\/\/www.etsi.org\/deliver\/etsi_ts\/103700_103799\/103744\/01.01.01_60\/ts_103744v010101p.pdf"},{"key":"1_CR5","unstructured":"Finextra. Singapore warns banks to prepare for quantum computing cyber threat, 2024. https:\/\/www.finextra.com\/newsarticle\/43739\/singapore-warns-banks-to-prepare-for-quantum-computing-cyberthreat#:~:text=to%20our%20community.-,Singapore%20warns%20banks%20to%20prepare%20for%20quantum%20computing%20cyber%20threat,risks%20posed%20by%20quantum%20computing"},{"key":"1_CR6","unstructured":"The\u00a0Linux Foundation. Post-quantum cryptography alliance launches to advance post-quantum cryptography, 2024. https:\/\/www.linuxfoundation.org\/press\/announcing-the-post-quantum-cryptography-alliance-pqca"},{"key":"1_CR7","unstructured":"Trusted\u00a0Computing Group. TCG algorithm registry, Family \u201c2.0\", Level 00 revision 01.34, august 24, 2023. https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/TCG-Algorithm-Registry-Revision-1.34_pub-1.pdf"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Lov\u00a0K. Grover. A fast quantum mechanical algorithm for database search. In STOC \u201996: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pages 212\u2013219, 1996","DOI":"10.1145\/237814.237866"},{"key":"1_CR9","unstructured":"IEEE. IEEE standard specification for public key cryptographic techniques based on hard problems over lattices. https:\/\/standards.ieee.org\/ieee\/1363.1\/3074\/"},{"key":"1_CR10","unstructured":"Global\u00a0Risk Institute. 2024 opinion-based estimates of the cumulative probability of a digital quantum computer able to break RSA-2048 in 24 hours, as function of timeframe. https:\/\/globalriskinstitute.org\/publication\/2024-quantum-threat-timeline-report"},{"key":"1_CR11","unstructured":"ISO\/IEC. ISO\/IEC 14888-4:2024 Information security \u2013 Digital signatures with appendix \u2013 Part 4: Stateful hash-based mechanisms. https:\/\/csrc.nist.gov\/pqc-standardization"},{"key":"1_CR12","unstructured":"ISO\/IEC. ISO\/IEC 18014-1 (all parts) Information technology \u2013 Security techniques \u2013 Time-stamping services"},{"key":"1_CR13","unstructured":"ITU-T. Overview of hybrid approaches for key exchange with quantum key distribution. https:\/\/www.itu.int\/dms_pub\/itu-t\/opb\/tut\/T-TUT-ICTS-2022-1-PDF-E.pdf"},{"key":"1_CR14","unstructured":"Abbinaya Kuzhanthaivel. Singapore issues an advisory for FIs to mitigate quantum computing risks, 2024. https:\/\/www.itnews.asia\/news\/singapore-issues-advisory-for-fis-to-mitigate-quantum-computing-risks-605273"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Long Meng and Liqun Chen. A blockchain-based long-term time-stamping scheme. In Proceedings of 27th European Symposium on Research in Computer Security (ESORICS 2022), Part 1, LNCS 13554, pages 3\u201324, 2022","DOI":"10.1007\/978-3-031-17140-6_1"},{"key":"1_CR16","unstructured":"Michele Mosca. Cybersecurity in an era with quantum computers: will we be ready? Cryptology ePrint Archive, Paper 2015\/1075, 2015. https:\/\/eprint.iacr.org\/2015\/1075"},{"key":"1_CR17","unstructured":"NCSC. Next steps in preparing for post-quantum cryptography, 2024. https:\/\/www.ncsc.gov.uk\/whitepaper\/next-steps-preparing-for-post-quantum-cryptography"},{"key":"1_CR18","unstructured":"NIST. Internal Report, NIST IR 8547 ipd, Transition to post-quantum cryptography standards, 2024. https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2024\/NIST.IR.8547.ipd.pdf"},{"key":"1_CR19","unstructured":"NIST. Post-quantum cryptography standardization, 2024. https:\/\/csrc.nist.gov\/pqc-standardization"},{"key":"1_CR20","unstructured":"World\u00a0Trade Organization. Standards and safety, 2024. https:\/\/www.wto.org\/english\/thewto_e\/whatis_e\/tif_e\/agrm4_e.htm"},{"key":"1_CR21","unstructured":"Anne-Fran\u00e7oise Pel\u00e9. French president details \u20ac1.8b quantum plan, 2021. https:\/\/www.eetimes.eu\/french-president-details-e1-8b-quantum-plan\/"},{"key":"1_CR22","unstructured":"John Potter. France sends first post-quantum encrypted diplomatic message, 2022. https:\/\/www.iotworldtoday.com\/industry\/france-sends-first-post-quantum-encrypted-diplomatic-message"},{"issue":"5","key":"1_CR23","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"1_CR24","unstructured":"TCG. Interview with Joe Pennisi, President of TCG. https:\/\/trustedcomputinggroup.org\/interview-with-joe-pennisi-president-of-tcg\/"},{"key":"1_CR25","unstructured":"TCG. Trusted computing group triumph as it reaches its 20-year milestone. https:\/\/trustedcomputinggroup.org\/trusted-computing-group-triumph-as-it-reaches-its-20-year-milestone\/"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87541-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:59:50Z","timestamp":1744203590000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87541-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031875403","9783031875410"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87541-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssresearch24.github.io\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}