{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:38:52Z","timestamp":1773157132339,"version":"3.50.1"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T00:00:00Z","timestamp":1710547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T00:00:00Z","timestamp":1710547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00515-3","type":"journal-article","created":{"date-parts":[[2024,3,16]],"date-time":"2024-03-16T07:02:11Z","timestamp":1710572531000},"page":"447-454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Use of hybrid post-quantum key exchange in internet protocols"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2995-2713","authenticated-orcid":false,"given":"Valery","family":"Smyslov","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,16]]},"reference":[{"key":"515_CR1","doi-asserted-by":"crossref","unstructured":"Grover, L. K.: A fast quantum mechanical algorithm for database search, 1996, https:\/\/arxiv.org\/abs\/quant-ph\/9605043","DOI":"10.1145\/237814.237866"},{"key":"515_CR2","unstructured":"Shor, P. W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer, 1996, https:\/\/arxiv.org\/abs\/quant-ph\/9508027"},{"key":"515_CR3","doi-asserted-by":"crossref","unstructured":"Bernstein, D. J.: Introduction to post-quantum cryptography, 2009, https:\/\/pqcrypto.org\/www.springer.com\/cda\/content\/document\/cda_downloaddocument\/9783540887010-c1.pdf","DOI":"10.1007\/978-3-540-88702-7_1"},{"key":"515_CR4","unstructured":"S. Fluhrer, Cryptanalysis of ring-LWE based key exchange with key share reuse, 2016, https:\/\/eprint.iacr.org\/2016\/085"},{"key":"515_CR5","doi-asserted-by":"crossref","unstructured":"Krawczyk H.: SIGMA: the \u2018SIGn-and-MAc\u2019 Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols, (2003)","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"515_CR6","unstructured":"Driscoll, F.: Terminology for Post-Quantum Traditional Hybrid Schemes, draft-ietf-pquip-pqt-hybrid-terminology (work in progress), https:\/\/datatracker.ietf.org\/doc\/draft-ietf-pquip-pqt-hybrid-terminology\/"},{"key":"515_CR7","unstructured":"Bernstein, D. J.: (djb@cr.yp.to), e-mail message to the CFRG mailing list (cfrg@irtf.org) with subject \u201cNSA vs. hybrid\u201d, Fri, 12 Nov 2021 09:28:11UTC, https:\/\/mailarchive.ietf.org\/arch\/msg\/cfrg\/T3XgKeJr4-PvmPrS5TwVNfW9t_w\/"},{"key":"515_CR8","unstructured":"Ounsworth, M., Wussler, A., Kousidis, S.: Combiner function for hybrid key encapsulation mechanisms (Hybrid KEMs), draft-ounsworth-cfrg-kem-combiners (work in progress), https:\/\/datatracker.ietf.org\/doc\/draft-ounsworth-cfrg-kem-combiners\/"},{"key":"515_CR9","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3, RFC 8446, August 2018, https:\/\/www.rfc-editor.org\/rfc\/rfc8446.html","DOI":"10.17487\/RFC8446"},{"key":"515_CR10","unstructured":"Stebila, D., Fluhrer, S., Gueron, S.: Hybrid key exchange in TLS 1.3, draft-ietf-tls-hybrid-design (work in progress), https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-hybrid-design\/"},{"key":"515_CR11","doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P., Kivinen, T.: Internet Key Exchange Protocol Version 2 (IKEv2), RFC 7296, October 2014, https:\/\/www.rfc-editor.org\/rfc\/rfc7296.html","DOI":"10.17487\/rfc7296"},{"key":"515_CR12","unstructured":"Tjhai, C. J., Tomlinson, M., Bartlett, G., Fluhrer, S., Van Geest, D., Garcia-Morchon, O., Smyslov, V.: Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2), RFC 9370, May 2023, https:\/\/www.rfc-editor.org\/rfc\/rfc9370.html"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00515-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00515-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00515-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:09:27Z","timestamp":1736417367000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00515-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,16]]},"references-count":12,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["515"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00515-3","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,16]]},"assertion":[{"value":"17 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}