{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:18:42Z","timestamp":1772911122708,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819797424","type":"print"},{"value":"9789819797431","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-9743-1_3","type":"book-chapter","created":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T17:02:25Z","timestamp":1730566945000},"page":"33-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9224-8480","authenticated-orcid":false,"given":"Aditya","family":"Joshi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2526-4404","authenticated-orcid":false,"given":"Pritam","family":"Bhalgat","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8352-443X","authenticated-orcid":false,"given":"Pratibha","family":"Chavan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6470-3900","authenticated-orcid":false,"given":"Tejaram","family":"Chaudhari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7047-0726","authenticated-orcid":false,"given":"Sumit","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,3]]},"reference":[{"key":"3_CR1","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science (1994)"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549, 188\u2013194 (2017)","journal-title":"Nature"},{"key":"3_CR3","unstructured":"Ott, D., Peikert, C., et al.: Identifying research challenges in post quantum cryptography migration and cryptographic agility. arXiv preprint arXiv:1909.07353 (2019)"},{"key":"3_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.200","volume":"5","author":"A Kumar","year":"2022","unstructured":"Kumar, A., Ottaviani, C., Gill, S.S., Buyya, R.: Securing the future internet of things with post-quantum cryptography. Secur. Priv. 5, e200 (2022)","journal-title":"Secur. Priv."},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.iot.2018.11.003","volume":"5","author":"PIR Grammatikis","year":"2019","unstructured":"Grammatikis, P.I.R., Sarigiannidis, P.G., Moscholios, I.D.: Securing the Internet of Things: challenges, threats and solutions. Internet of Things 5, 41\u201370 (2019)","journal-title":"Internet of Things"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MCE.2017.2755298","volume":"7","author":"T Humble","year":"2018","unstructured":"Humble, T.: Consumer applications of quantum computing: a promising approach for secure computation, trusted data storage, and efficient applications. IEEE Consum. Electron. Mag. 7, 8\u201314 (2018)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"3_CR7","unstructured":"Denker, K., Javaid, A.Y.: Quantum computing as a threat to modern cryptography techniques. In: Proceedings of the International Conference on Foundations of Computer Science (FCS) (2019)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Aji, A., Jain, K., Krishnan, P.: A survey of quantum key distribution (QKD) network simulation platforms. In: 2021 2nd Global Conference for Advancement in Technology (GCAT) (2021)","DOI":"10.1109\/GCAT52182.2021.9587708"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Jain, K., Krishnan, P., Rao, V.V.: A comparison based approach on mutual authentication and key agreement using DNA cryptography. In: 2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT) (2021)","DOI":"10.1109\/ICECCT52121.2021.9616899"},{"key":"3_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100174","volume":"9","author":"A Lohachab","year":"2020","unstructured":"Lohachab, A., Lohachab, A., Jangra, A.: A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet of Things 9, 100174 (2020)","journal-title":"Internet of Things"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Alagic, G., et al.: Peralta and others. In: Status report on the first round of the NIST post-quantum cryptography standardization process (2019)","DOI":"10.6028\/NIST.IR.8240"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Alagic, G., et al.: Status report on the second round of the NIST post-quantum cryptography standardization process. In: US Department of Commerce, NIST, vol. 2, p. 69 (2020)","DOI":"10.6028\/NIST.IR.8240"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Alagic, G., et al.: Status report on the third round of the NIST post-quantum cryptography standardization process (2022)","DOI":"10.6028\/NIST.IR.8413"},{"key":"3_CR14","unstructured":"Turan, M.S., et al.: Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process. US Department of Commerce, National Institute of Standards and Technology (2023)"},{"key":"3_CR15","first-page":"11","volume":"7","author":"O Regev","year":"2010","unstructured":"Regev, O.: The learning with errors problem. Invited Surv. CCC 7, 11 (2010)","journal-title":"Invited Surv. CCC"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: International Algorithmic Number Theory Symposium (1998)","DOI":"10.1007\/BFb0054868"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case\/average-case equivalence. In: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing (1997)","DOI":"10.1145\/258533.258604"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/3-540-48405-1_18","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Nguyen","year":"1999","unstructured":"Nguyen, P.: Cryptanalysis of the goldreich-goldwasser-halevi cryptosystem from crypto \u201997. In: Wiener, M. (ed.) Advances in Cryptology \u2014 CRYPTO\u2019 99, pp. 288\u2013304. Springer Berlin Heidelberg, Berlin, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_18"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/BFb0052231","volume-title":"Advances in Cryptology \u2014 CRYPTO '97: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17\u201321, 1997 Proceedings","author":"O Goldreich","year":"1997","unstructured":"Goldreich, O., Goldwasser, S., Halevi, S.: Public-key cryptosystems from lattice reduction problems. In: Kaliski, B.S. (ed.) Advances in Cryptology \u2014 CRYPTO \u201997: 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17\u201321, 1997 Proceedings, pp. 112\u2013131. Springer Berlin Heidelberg, Berlin, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052231"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/BFb0055731","volume-title":"Advances in Cryptology \u2014 CRYPTO '98","author":"P Nguyen","year":"1998","unstructured":"Nguyen, P., Stern, J.: Cryptanalysis of the Ajtai-Dwork cryptosystem. In: Krawczyk, H. (ed.) Advances in Cryptology \u2014 CRYPTO \u201998, pp. 223\u2013242. Springer Berlin Heidelberg, Berlin, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0055731"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3292548","volume":"51","author":"H Nejatollahi","year":"2019","unstructured":"Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Post-quantum lattice-based cryptography implementations: a survey. ACM Comput. Surv. 51, 1\u201341 (2019)","journal-title":"ACM Comput. Surv."},{"key":"3_CR22","unstructured":"Merkle, R.C.: Secrecy, Authentication, and Public key Systems. Stanford University (1979)"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Potii, O., Gorbenko, Y., Isirova, K.: Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure. In: 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) (2017)","DOI":"10.1109\/INFOCOMMST.2017.8246360"},{"key":"3_CR24","unstructured":"Lamport, L.: Constructing digital signatures from a one way function (1979)"},{"key":"3_CR25","first-page":"114","volume":"4244","author":"RJ McEliece","year":"1978","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic. Coding Thv. 4244, 114\u2013116 (1978)","journal-title":"Coding Thv."},{"key":"3_CR26","first-page":"682","volume":"72","author":"Y-M Kuo","year":"2022","unstructured":"Kuo, Y.-M., Garcia-Herrero, F., Ruano, O., Antonio Maestro, J.: RISC-V Galois field ISA extension for non-binary error-correction codes and classical and post-quantum cryptography. IEEE Trans. Comput. 72, 682\u2013692 (2022)","journal-title":"IEEE Trans. Comput."},{"key":"3_CR27","unstructured":"Biswas, B., Sendrier, N.: McEliece cryptosystem implementation: theory and practice. In: Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA, Oct 17\u201319, 2008 Proceedings 2 (2008)"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Ding, J.. Gower, J.E., Schmidt, D.S.: Multivariate public-key cryptosystems. In: International Conference on the Algebra and its Application (2005)","DOI":"10.1090\/conm\/419\/07997"},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/3-540-45961-8_39","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201988: Workshop on the Theory and Application of Cryptographic Techniques Davos, Switzerland, May 25\u201327, 1988 Proceedings","author":"T Matsumoto","year":"1988","unstructured":"Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: Barstow, D., et al. (eds.) Advances in Cryptology \u2014 EUROCRYPT \u201988: Workshop on the Theory and Application of Cryptographic Techniques Davos, Switzerland, May 25\u201327, 1988 Proceedings, pp. 419\u2013453. Springer Berlin Heidelberg, Berlin, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-45961-8_39"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0022-4049(99)00005-5","volume":"139","author":"J-C Faugere","year":"1999","unstructured":"Faugere, J.-C.: A new efficient algorithm for computing Gr\u00f6bner bases (F4). J. Pure Appl. Algebra 139, 61\u201388 (1999)","journal-title":"J. Pure Appl. Algebra"},{"key":"3_CR31","unstructured":"Faugere, J. C.: A new efficient algorithm for computing Gr\u00f6bner bases without reduction to zero (F 5). In: Proceedings of the 2002 international symposium on Symbolic and algebraic computation (2002)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: International Conference on the Theory and Applications of Cryptographic Techniques (2000)","DOI":"10.1007\/3-540-45539-6_27"},{"key":"3_CR33","unstructured":"T. N. I. of Standards and Technology, Post-Quantum Cryptography Standardization,2(018)"},{"key":"3_CR34","doi-asserted-by":"publisher","first-page":"2490","DOI":"10.1109\/TCSI.2022.3162626","volume":"69","author":"R Elkhatib","year":"2022","unstructured":"Elkhatib, R., Koziel, B., Azarderakhsh, R., Kermani, M.M.: Accelerated RISC-V for post-quantum SIKE. IEEE Trans. Circuits Syst. I Regul. Pap. 69, 2490\u20132501 (2022)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"3_CR35","unstructured":"Dobraunig, C., Eichlseder, M., Mendel, F.. M. Schlaffer, F.: ASCON v1.2 (2021)"},{"key":"3_CR36","unstructured":"Beyne, T., Chen, Y., Dobraunig, C., Mennink, B.: Elephant v2, vol. 2 (2021)"},{"key":"3_CR37","unstructured":"Banik, S., et al.: GIFT-COFB v1.1 (2021)"}],"container-title":["Communications in Computer and Information Science","Applications and Techniques in Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-9743-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T17:03:38Z","timestamp":1730567018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-9743-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,3]]},"ISBN":["9789819797424","9789819797431"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-9743-1_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,3]]},"assertion":[{"value":"3 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}