{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T23:18:21Z","timestamp":1761175101008,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":74,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032017987","type":"print"},{"value":"9783032017994","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01799-4_15","type":"book-chapter","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T07:47:35Z","timestamp":1761119255000},"page":"266-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Integration of\u00a0PQC and\u00a0QKD: Applications, Challenges and\u00a0Implementation Frameworks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2680-3220","authenticated-orcid":false,"given":"Elina","family":"Kalnina","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9641-080X","authenticated-orcid":false,"given":"Rihards","family":"Balodis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9608-3792","authenticated-orcid":false,"given":"Edgars","family":"Celms","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7085-383X","authenticated-orcid":false,"given":"Sergejs","family":"Kozlovics","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0760-9268","authenticated-orcid":false,"given":"Inara","family":"Opmane","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5713-5914","authenticated-orcid":false,"given":"Krisjanis","family":"Petrucena","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1606-4944","authenticated-orcid":false,"given":"Edgars","family":"Rencis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2283-2978","authenticated-orcid":false,"given":"Juris","family":"Viksna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"15_CR1","unstructured":"Regulatory Horizons Council, Regulating Quantum Technology Applications (2024)"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Wang, L.J., Zhang, K.Y., Wang, J.Y., et\u00a0al.: Experimental authentication of quantum key distribution with post-quantum cryptography. npj Quant. Inf. 7, 67 (2021). https:\/\/doi.org\/10.1038\/s41534-021-00400-7","DOI":"10.1038\/s41534-021-00400-7"},{"key":"15_CR3","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Goldwasser, S. (ed.) Proceedings of the 35th Annual Symposium on Foundations of Computer Science (FOCS), pp. 124\u2013134. IEEE Computer Society Press, Los Alamitos (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"15_CR4","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation, Third-round submission to the NIST\u2019s post-quantum cryptography standardization process (2020). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/round-3-submissions"},{"key":"15_CR5","unstructured":"Bai, S., et al.: CRYSTALS-Dilithium: algorithm specifications and supporting documentation, Version 3.1. (2021). https:\/\/pq-crystals.org\/dilithium\/data\/dilithium-specification-round3-20210208.pdf"},{"key":"15_CR6","unstructured":"Prest, T., et al.: Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU. Submission to the NIST\u2019s post-quantum cryptography standardization process, Version 1.2. (2020). https:\/\/falcon-sign.info\/falcon.pdf"},{"key":"15_CR7","unstructured":"Aumasson, J.P., et al.: SPHINCS+ \u2013 Submission to the NIST post-quantum project, Version 3.1. (2022). https:\/\/sphincs.org\/data\/sphincs+-r3.1-specification.pdf"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"NIST: FIPS 203 Module-Lattice-Based Key-Encapsulation Mechanism Standard. Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8900 (2024). https:\/\/doi.org\/10.6028\/NIST.FIPS.203","DOI":"10.6028\/NIST.FIPS.203"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"NIST: FIPS 204 Module-Lattice-Based Digital Signature Standard. Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8900 (2024). https:\/\/doi.org\/10.6028\/NIST.FIPS.204","DOI":"10.6028\/NIST.FIPS.204"},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"NIST: FIPS 205 Stateless Hash-Based Digital Signature Standard. Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8900 (2024). https:\/\/doi.org\/10.6028\/NIST.FIPS.205","DOI":"10.6028\/NIST.FIPS.205"},{"key":"15_CR11","unstructured":"Aguilar-Melchor, C., et al.: Hamming Quasi-Cyclic (HQC) \u2013 Submission to the NIST post-quantum project, Fourth round version, Updated version 19\/02\/2025 (2025). https:\/\/pqc-hqc.org\/doc\/hqc-specification_2025-02-19.pdf"},{"key":"15_CR12","unstructured":"Merkle R.C.: Secrecy, authentication, and public key systems. Ph.D. thesis, Stanford university (1979). http:\/\/www.ralphmerkle.com\/papers\/Thesis1979.pdf"},{"key":"15_CR13","unstructured":"Lamport, L.: Constructing digital signatures from a one way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory (1979)"},{"key":"15_CR14","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS+ signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), pp. 2129\u20132146. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3363229","DOI":"10.1145\/3319535.3363229"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25405-5_8","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117\u2013129. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_8"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-38553-7_10","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"A H\u00fclsing","year":"2013","unstructured":"H\u00fclsing, A.: W-OTS+ \u2013 shorter signatures for hash-based signature schemes. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 173\u2013188. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38553-7_10"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-319-89641-0_10","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"MJ Kannwischer","year":"2018","unstructured":"Kannwischer, M.J., Gen\u00eat, A., Butin, D., Kr\u00e4mer, J., Buchmann, J.: Differential power analysis of XMSS and\u00a0SPHINCS. In: Fan, J., Gierlichs, B. (eds.) COSADE 2018. LNCS, vol. 10815, pp. 168\u2013188. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89641-0_10"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-319-79063-3_8","volume-title":"Post-Quantum Cryptography","author":"L Castelnovi","year":"2018","unstructured":"Castelnovi, L., Martinelli, A., Prest, T.: Grafting trees: a fault attack against the SPHINCS framework. In: Lange, T., Steinwandt, R. (eds.) PQCrypto 2018. LNCS, vol. 10786, pp. 165\u2013184. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-79063-3_8"},{"key":"15_CR19","unstructured":"Gen\u00eat, A., Kannwischer, M.J., Pelletier, H., McLauchlan, A.: Practical fault injection attacks on SPHINCS, Cryptology ePrint Archive, Paper 2018\/674 (2018). https:\/\/ia.cr\/2018\/674"},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Amiet, D., Leuenberger, L., Curiger, A., Zbinden, P.: FPGA-based SPHINCS+ implementations: mind the glitch. In: 2020 23rd Euromicro Conference on Digital System Design (DSD), Kranj, Slovenia, pp. 229\u2013237. IEEE (2020). https:\/\/doi.org\/10.1109\/DSD51259.2020.00046","DOI":"10.1109\/DSD51259.2020.00046"},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Gen\u00eat, A.: On protecting SPHINCS+ against fault attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023(2), 80\u2013114 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i2.80-114","DOI":"10.46586\/tches.v2023.i2.80-114"},{"key":"15_CR22","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. DSN Progr. Rep., 42\u201344 (1978)"},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10207-011-0153-2","volume":"11","author":"R Niebuhr","year":"2012","unstructured":"Niebuhr, R., Meziani, M., Bulygin, S., Buchmann, J.: Selecting parameters for secure McEliece-based cryptosystems. Int. J. Inf. Secur. 11, 137\u2013147 (2012). https:\/\/doi.org\/10.1007\/s10207-011-0153-2","journal-title":"Int. J. Inf. Secur."},{"key":"15_CR24","doi-asserted-by":"publisher","unstructured":"Randriambololona, H.: The syzygy distinguisher. In: Fehr, S., Fouque, P.A. (eds.) EUROCRYPT 2025. LNCS, vol. 15606, pp. 324\u2013354, Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-91095-1_12","DOI":"10.1007\/978-3-031-91095-1_12"},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"Aguilar-Melchor, C., Blazy, O., Deneuville, J.C., Gaborit, P., Z\u00e9mor, G.: Efficient encryption from random Quasi-cyclic codes. IEEE Trans. Inf. Theory 64(5), 3927\u20133943 (2018). https:\/\/doi.org\/10.1109\/TIT.2018.2804444","DOI":"10.1109\/TIT.2018.2804444"},{"key":"15_CR26","doi-asserted-by":"publisher","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 1\u201340 (2009). https:\/\/doi.org\/10.1145\/1568318.1568324. Article 34","DOI":"10.1145\/1568318.1568324"},{"key":"15_CR27","doi-asserted-by":"publisher","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. J. ACM 60(6), 1\u201335 (2013). https:\/\/doi.org\/10.1145\/2535925. Article 43","DOI":"10.1145\/2535925"},{"key":"15_CR28","doi-asserted-by":"publisher","unstructured":"Ajtai, M., Kumar, R., Sivakumar, D.: A sieve algorithm for the shortest lattice vector problem. In: Proceedings of the 33th Annual ACM Symposium on Theory of Computing, STOC 2001, pp. 601\u2013610. ACM (2001). https:\/\/doi.org\/10.1145\/380752.380857","DOI":"10.1145\/380752.380857"},{"key":"15_CR29","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1515\/JMC.2008.009","volume":"2","author":"PQ Nguyen","year":"2008","unstructured":"Nguyen, P.Q., Vidick, T.: Sieve algorithms for the shortest vector problem are practical. J. Math. Cryptol. 2, 181\u2013207 (2008). https:\/\/doi.org\/10.1515\/JMC.2008.009","journal-title":"J. Math. Cryptol."},{"key":"15_CR30","doi-asserted-by":"publisher","unstructured":"Schnorr, C.P.: lattice basis reduction: improved practical algorithms and solving subset sum problems. J. Math. Program. 66, 181\u2013191 (1994). https:\/\/doi.org\/10.1007\/BF01581144","DOI":"10.1007\/BF01581144"},{"key":"15_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-642-13190-5_13","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"N Gama","year":"2010","unstructured":"Gama, N., Nguyen, P.Q., Regev, O.: Lattice enumeration using extreme pruning. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 257\u2013278. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_13"},{"issue":"4","key":"15_CR32","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A Lenstra","year":"1982","unstructured":"Lenstra, A., Lenstra, H., Lovasz, L.: Factoring polynomials with rational coefficients. J. Mathematische Annalen 261(4), 515\u2013534 (1982). https:\/\/doi.org\/10.1007\/BF01457454","journal-title":"J. Mathematische Annalen"},{"key":"15_CR33","doi-asserted-by":"publisher","unstructured":"Schnorr, C.P.: A hierarchy of polynomial time lattice basis reduction algorithms. J. Theoret. Comput. Sci. 53(2-3), 201\u2013224 (1987). https:\/\/doi.org\/10.1016\/0304-3975(87)90064-8. ISSN 0304-3975","DOI":"10.1016\/0304-3975(87)90064-8"},{"key":"15_CR34","unstructured":"Wenger, E., Chen, M., Charton, F., Lauter, K.: SALSA: attacking lattice cryptography with transformers. In: Proceedings of the 36th International Conference on Neural Information Processing Systems (NIPS 2022), pp. 34981\u201334994. Curran Associates Inc., Red Hook (2022). Article 2535"},{"key":"15_CR35","doi-asserted-by":"publisher","unstructured":"Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164\u2013175. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_12","DOI":"10.1007\/11496137_12"},{"key":"15_CR36","doi-asserted-by":"publisher","unstructured":"Beullens, W.: Breaking rainbow takes a weekend on a laptop. In: Dodis, Y., Shrimpton, T. (eds) CRYPTO 2022. LNCS, vol. 13508, pp. 464\u2013479, Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15979-4_16","DOI":"10.1007\/978-3-031-15979-4_16"},{"key":"15_CR37","doi-asserted-by":"crossref","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (2023). https:\/\/doi.org\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"15_CR38","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179 (1984)"},{"key":"15_CR39","doi-asserted-by":"publisher","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000). https:\/\/doi.org\/10.1103\/PhysRevLett.85.441","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"15_CR40","doi-asserted-by":"publisher","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3121","DOI":"10.1103\/PhysRevLett.68.3121"},{"key":"15_CR41","doi-asserted-by":"publisher","unstructured":"Scarani, V., Ac\u00edn, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92(5), 057901 (2004). https:\/\/doi.org\/10.1103\/PhysRevLett.92.057901","DOI":"10.1103\/PhysRevLett.92.057901"},{"key":"15_CR42","doi-asserted-by":"publisher","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991). https:\/\/doi.org\/10.1103\/PhysRevLett.67.661","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"15_CR43","doi-asserted-by":"publisher","unstructured":"Stucki, D., Brunner, N., Gisin, N., Scarani, V., Zbinden, H.: Fast and simple one-way quantum key distribution. Appl. Phys. Lett. 87(19), 194108 (2005). https:\/\/doi.org\/10.1063\/1.2126792","DOI":"10.1063\/1.2126792"},{"key":"15_CR44","doi-asserted-by":"publisher","unstructured":"Hoque, S., Aydeger, A., Zeydan, E.: Exploring post quantum cryptography with quantum key distribution for sustainable mobile network architecture design. In: Proceedings of the 4th Workshop on Performance and Energy Efficiency in Concurrent and Distributed Systems (PECS 2024), pp. 9\u201316. Association for Computing Machinery (2024). https:\/\/doi.org\/10.1145\/3659997.3660033","DOI":"10.1145\/3659997.3660033"},{"key":"15_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/978-3-030-44223-1_26","volume-title":"Post-Quantum Cryptography","author":"B Dowling","year":"2020","unstructured":"Dowling, B., Hansen, T.B., Paterson, K.G.: Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 483\u2013502. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_26"},{"issue":"4","key":"15_CR46","doi-asserted-by":"publisher","first-page":"2300304","DOI":"10.1002\/qute.202300304","volume":"7","author":"L Garms","year":"2024","unstructured":"Garms, L., et al.: Experimental integration of quantum key distribution and post-quantum cryptography in a hybrid quantum-safe cryptosystem. Adv. Quantum Technol. 7(4), 2300304 (2024). https:\/\/doi.org\/10.1002\/qute.202300304","journal-title":"Adv. Quantum Technol."},{"key":"15_CR47","doi-asserted-by":"publisher","unstructured":"Bruckner, S., Ramacher, S., Striecks, C.: Muckle+: end-to-end hybrid authenticated key exchanges. In: Johansson, T., Smith-Tone, D. (eds.) Post-Quantum Cryptography (PQCrypto 2023). LNCS, vol. 14154, pp. 601\u2013633. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-40003-2_22","DOI":"10.1007\/978-3-031-40003-2_22"},{"issue":"16","key":"15_CR48","doi-asserted-by":"publisher","first-page":"25859","DOI":"10.1364\/OE.432944","volume":"29","author":"YH Yang","year":"2021","unstructured":"Yang, Y.H., et al.: All optical metropolitan quantum key distribution network with post-quantum cryptography authentication. Opt. Express 29(16), 25859\u201325867 (2021). https:\/\/doi.org\/10.1364\/OE.432944","journal-title":"Opt. Express"},{"key":"15_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-45388-6_2","volume-title":"Public-Key Cryptography \u2013 PKC 2020","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Yu, Yu., Fan, S., Zhang, Z., Yang, K.: Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes. In: Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V. (eds.) PKC 2020. LNCS, vol. 12111, pp. 37\u201365. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45388-6_2"},{"key":"15_CR50","unstructured":"Telsy SpA: Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC). https:\/\/www.telsy.com\/en\/quantum-key-distribution-qkd-and-post-quantum-cryptography-pqc\/"},{"key":"15_CR51","unstructured":"ID Quantique SA: PQC-QKD Hybridization in Orange\u2019s Fiber Network (2024). https:\/\/www.idquantique.com\/pqc-qkd-hybridization-in-orange-fiber-network\/"},{"key":"15_CR52","unstructured":"Ginga, S.: Shielding Your Network: Preparing for a Quantum-Safe Future Now. In: THALES BLOG (2024). https:\/\/cpl.thalesgroup.com\/blog\/encryption\/preparing-for-a-quantum-safe-future-now"},{"key":"15_CR53","unstructured":"Juniper Networks, Inc.: Validation of Quantum Safe MACsec Implementation (2022). https:\/\/www.juniper.net\/content\/dam\/www\/assets\/white-papers\/us\/en\/2022\/validation-of-quantum-safe-macsec-white-paper.pdf"},{"key":"15_CR54","unstructured":"European Telecommunications Standards Institute (ETSI): Quantum Key Distribution (QKD); Protocol and data format of REST-based key delivery API. ETSI GS QKD 014 V1.1.1 (2019)"},{"key":"15_CR55","unstructured":"Aelmans, M.: NIST Finalizes Post-Quantum Encryption Standards. Blog post in Juniper Networks, Inc. (2024). https:\/\/blogs.juniper.net\/en-us\/industry-solutions-and-trends\/nist-finalizes-post-quantum-encryption-standards"},{"key":"15_CR56","unstructured":"Singh, R., Hill, C., Kawaguchi, S., Lupo, J.: Secure Key Integration Protocol (SKIP). In: draft-cisco-skip-00 (2024). https:\/\/datatracker.ietf.org\/doc\/draft-cisco-skip\/00\/"},{"key":"15_CR57","unstructured":"ETSI: Quantum Key Distribution (QKD); Protocol and Data Format of REST-based Key Delivery API. In: ETSI GS QKD 014 V1.1.1 (2019-02) (2019). https:\/\/www.etsi.org\/deliver\/etsi_gs\/QKD\/001_099\/014\/01.01.01_60\/gs%5Ctextbf_QKD014v010101p.pdf"},{"key":"15_CR58","doi-asserted-by":"crossref","unstructured":"Fluhrer, S., Kampanakis, P., McGrew, D., Smyslov, V.: mixing preshared keys in the internet key exchange protocol version 2 (IKEv2) for post-quantum security. In: RFC 8784, Internet Engineering Task Force (IETF) (2020). https:\/\/datatracker.ietf.org\/doc\/html\/rfc8784","DOI":"10.17487\/RFC8784"},{"key":"15_CR59","unstructured":"Cisco Systems, Inc.: Chapter: configuring quantum-safe encryption using postquantum preshared keys. In: Security and VPN Configuration Guide, Cisco IOS XE 17.x (2021). https:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/routers\/ios\/config\/17-x\/sec-vpn\/b-security-vpn\/m-sec-cfg-quantum-encryption-ppk.html"},{"key":"15_CR60","doi-asserted-by":"publisher","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., Kivinen, T.: Internet key exchange protocol version 2 (IKEv2). In: STD 79, RFC 7296 (2014). https:\/\/doi.org\/10.17487\/RFC7296","DOI":"10.17487\/RFC7296"},{"key":"15_CR61","unstructured":"Hoffman, P.: The transition from classical to post-quantum cryptography. In: Network Working Group (2020). https:\/\/datatracker.ietf.org\/doc\/html\/draft-hoffman-c2pq-07"},{"key":"15_CR62","unstructured":"Aziz, A., Markson, T., Prafullchandra, H.: Simple Key-Management For Internet Protocols (SKIP) (1996). https:\/\/datatracker.ietf.org\/doc\/draft-ietf-ipsec-skip\/06\/"},{"key":"15_CR63","doi-asserted-by":"publisher","unstructured":"Kozlovi\u010ds, S., Petru\u010den\u0327a, K., L\u0101rin\u0327\u0161, D., V\u012bksna, J.: Quantum key distribution as a service and its injection into TLS. In: Meng, W., Yan, Z., Piuri, V. (eds.) Information Security Practice and Experience (ISPEC 2023). LNCS, vol. 14341, pp. 527\u2013545. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-7032-2_31","DOI":"10.1007\/978-981-99-7032-2_31"},{"key":"15_CR64","unstructured":"IMCS SysLab: Bouncy Castle Fork at IMCS SysLab for Implementing the TLS Injection Mechanism (for Adding PQC\/QKD-Related Code to TLS). https:\/\/github.com\/LUMII-Syslab\/tls-injection-mechanism"},{"key":"15_CR65","unstructured":"IMCS SysLab: Integration of PQC Algorithms into the BouncyCastle TLS Injection Mechanism. https:\/\/github.com\/LUMII-Syslab\/tls-injection-pqc"},{"key":"15_CR66","unstructured":"IMCS SysLab: TLS Client Example with Injected PQC Algorithm. https:\/\/github.com\/LUMII-Syslab\/tls-injection-pqc"},{"key":"15_CR67","unstructured":"Microsoft: Post-Quantum Crypto and VPNs. https:\/\/www.microsoft.com\/en-us\/research\/project\/post-quantum-crypto-vpn"},{"key":"15_CR68","unstructured":"Microsoft: Post-Quantum Cryptography VPN. https:\/\/github.com\/microsoft\/PQCrypto-VPN"},{"key":"15_CR69","unstructured":"Open Quantum Safe: OQS-Demos \/ OpenVPN. https:\/\/github.com\/open-quantum-safe\/oqs-demos\/tree\/main\/openvpn"},{"key":"15_CR70","unstructured":"Powell, O.: Why Every VPN Should Use Post-Quantum Encryption. Tom\u2019s Guide (2024). https:\/\/www.tomsguide.com\/computing\/vpns\/why-every-vpn-should-use-post-quantum-encryption"},{"key":"15_CR71","unstructured":"Tama\u0161i\u016bnas, L.: NordVPN Launches First App with Post-Quantum Encryption Support. NordVPN Blog (2024). https:\/\/nordvpn.com\/blog\/nordvpn-linux-post-quantum-encryption-support\/"},{"key":"15_CR72","unstructured":"Meshi, Y.: PAN-OS 11.2 Quasar Helps Customers Secure Networks Everywhere, Faster. Palo Alto Networks Blog (2024). https:\/\/www.paloaltonetworks.com\/blog\/network-security\/quasarlaunch\/"},{"key":"15_CR73","unstructured":"Palo Alto Networks, Inc.: Network Security, Quantum Security Concepts (2023). https:\/\/docs.paloaltonetworks.com\/network-security\/quantum-security\/administration\/quantum-security-concepts"},{"key":"15_CR74","unstructured":"Internet Engineering Task Force (IETF): Secure Key Integration Protocol (SKIP). Version: draft-cisco-skip-00. https:\/\/datatracker.ietf.org\/doc\/draft-cisco-skip\/00\/"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01799-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T08:03:45Z","timestamp":1761120225000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01799-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"ISBN":["9783032017987","9783032017994"],"references-count":74,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01799-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"23 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}