{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:40:10Z","timestamp":1744206010096,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031875403","type":"print"},{"value":"9783031875410","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87541-0_8","type":"book-chapter","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:00:37Z","timestamp":1744203637000},"page":"175-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Transitioning to\u00a0Quantum-Secure Encryption Schemes"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-2212-984X","authenticated-orcid":false,"given":"Shao","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0868-0480","authenticated-orcid":false,"given":"Songsong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9036-9788","authenticated-orcid":false,"given":"Ying","family":"Ouyang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7937-3779","authenticated-orcid":false,"given":"Yanhong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"8_CR1","unstructured":"National institute of standards and technology (NIST): Post-quantum cryptography: call for proposals (2017). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/Call-for-Proposals"},{"key":"8_CR2","unstructured":"Module-lattice-based key-encapsulation mechanism standard (2024). https:\/\/csrc.nist.gov\/pubs\/fips\/203\/final"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Barbosa, M., et al.: X-wing. IACR Commun. Cryptology 1(1) (2024). https:\/\/doi.org\/10.62056\/a3qj89n4e","DOI":"10.62056\/a3qj89n4e"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Bindel, N., Brendel, J., Fischlin, M., Goncalves, B., Stebila, D.: Hybrid key encapsulation mechanisms and authenticated key exchange. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 206\u2013226. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_12","DOI":"10.1007\/978-3-030-25510-7_12"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Bindel, N., Herath, U., McKague, M., Stebila, D.: Transitioning to a quantum-resistant public key infrastructure. In: PQCrypto 2017. LNCS, vol. 10346, pp. 384\u2013405. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-59879-6_22","DOI":"10.1007\/978-3-319-59879-6_22"},{"key":"8_CR6","doi-asserted-by":"publisher","unstructured":"Boneh, D., Dagdelen, \u00d6., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: ASIACRYPT 2011. LNCS, vol.\u00a07073, pp. 41\u201369. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_3","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Boneh, D., Zhandry, M.: Quantum-secure message authentication codes. In: EUROCRYPT 2013. LNCS, vol.\u00a07881, pp. 592\u2013608. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_35","DOI":"10.1007\/978-3-642-38348-9_35"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Boneh, D., Zhandry, M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol.\u00a08043, pp. 361\u2013379. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-40084-1_21","DOI":"10.1007\/978-3-642-40084-1_21"},{"key":"8_CR9","unstructured":"Campagna, M., Crockett, E.: Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). Internet-Draft draft-campagna-tls-bike-sike-hybrid-07, Internet Engineering Task Force (2021). https:\/\/datatracker.ietf.org\/doc\/draft-campagna-tls-bike-sike-hybrid\/07\/, work in Progress"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14008, pp. 423\u2013447. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"8_CR11","unstructured":"Crockett, E., Paquin, C., Stebila, D.: Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. IACR Cryptol. ePrint Arch. p.\u00a0858 (2019)"},{"key":"8_CR12","unstructured":"Gagliardoni, T.: Quantum security of cryptographic primitives. CoRR abs\/1705.02417 (2017). http:\/\/arxiv.org\/abs\/1705.02417"},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Giacon, F., Heuer, F., Poettering, B.: KEM combiners. In: PKC 2018. LNCS, vol. 10769, pp. 190\u2013218. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-76578-5_7","DOI":"10.1007\/978-3-319-76578-5_7"},{"key":"8_CR14","unstructured":"Ounsworth, M., Gray, J., Mister, S.: Composite Encryption For Use In Internet PKI. Internet-Draft draft-ounsworth-pq-composite-encryption-01, Internet Engineering Task Force (2022). https:\/\/datatracker.ietf.org\/doc\/draft-ounsworth-pq-composite-encryption\/01\/, work in Progress"},{"key":"8_CR15","unstructured":"Ounsworth, M., Gray, J., Pala, M., , Klau\u00dfner, J., Fluhrer, S.: Composite ml-kem for use in the internet x.509 public key infrastructure and CMS. Tech. rep., Internet-Draft draft-ietf-lamps-pq-composite-kem-04, Internet Engineering Task Force (2024)"},{"key":"8_CR16","unstructured":"Ounsworth, M., Pala, M.: Composite signatures for use in internet PKI. Internet-Draft Internet-Draft draft-ounsworth-pq-composite-sigs-06, Internet Engineering Task Force (2022). https:\/\/www.ietf.org\/archive\/id\/draft-ounsworth-pq-composite-sigs-06.html"},{"key":"8_CR17","unstructured":"Ounsworth, M., Wussler, A., Kousidis, S.: Combiner function for hybrid key encapsulation mechanisms (hybrid KEMs). Tech. rep., Internet-Draft draft-ounsworth-cfrg-kem-combiners-05, Internet Engineering Task Force (2024)"},{"key":"8_CR18","unstructured":"Schanck, J.M., Whyte, W., Zhang, Z.: Quantum-Safe Hybrid (QSH) Ciphersuite for Transport Layer Security (TLS) version 1.2. Internet-Draft draft-whyte-qsh-tls12-02, Internet Engineering Task Force (2016), work in Progress"},{"key":"8_CR19","unstructured":"Stebila, D., Fluhrer, S., Gueron, S.: Hybrid key exchange in TLS 1.3. Internet-Draft draft-ietf-tls-hybrid-design-11, Internet Engineering Task Force (2024). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-hybrid-design\/11\/, work in Progress"},{"key":"8_CR20","unstructured":"Whyte, W., Zhang, Z., Fluhrer, S., Garcia-Morchon, O.: Quantum-Safe Hybrid (QSH) Key Exchange for Transport Layer Security (TLS) version 1.3. Internet-Draft draft-whyte-qsh-tls13-06, Internet Engineering Task Force (Oct 2017), work in Progress"},{"key":"8_CR21","doi-asserted-by":"publisher","unstructured":"Zhandry, M.: How to construct quantum random functions. J. ACM 68(5), 33:1\u201333:43 (2021). https:\/\/doi.org\/10.1145\/3450745","DOI":"10.1145\/3450745"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87541-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:00:44Z","timestamp":1744203644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87541-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031875403","9783031875410"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87541-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssresearch24.github.io\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}