{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T20:54:34Z","timestamp":1774212874558,"version":"3.50.1"},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T00:00:00Z","timestamp":1737072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11432-024-4163-6","type":"journal-article","created":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T08:16:30Z","timestamp":1737533790000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Quantum attack on RSA by D-Wave Advantage: a first break of 80-bit RSA"],"prefix":"10.1007","volume":"68","author":[{"given":"Chunlei","family":"Hong","sequence":"first","affiliation":[]},{"given":"Zhi","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Qidi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shuxiao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jingjing","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"4163_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R L Rivest","year":"1978","unstructured":"Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM, 1978, 21: 120\u2013126","journal-title":"Commun ACM"},{"key":"4163_CR2","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/0009-2614(94)00117-0","volume":"219","author":"A B Finnila","year":"1994","unstructured":"Finnila A B, Gomez M A, Sebenik C, et al. Quantum annealing: a new method for minimizing multidimensional functions. Chem Phys Lett, 1994, 219: 343","journal-title":"Chem Phys Lett"},{"key":"4163_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02579403","volume":"6","author":"L Babai","year":"1986","unstructured":"Babai L. On Lovasz\u2019 lattice reduction and the nearest lattice point problem. Combinatorica, 1986, 6: 1\u201313","journal-title":"Combinatorica"},{"key":"4163_CR4","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"A K Lenstra","year":"1982","unstructured":"Lenstra A K, Lenstra H W, Lovasz L. Factoring polynomials with rational coefficients. Math Ann, 1982, 261: 515\u2013534","journal-title":"Math Ann"},{"key":"4163_CR5","unstructured":"Yan B, Tan Z, Wei S, et al. Factoring integers with sublinear resources on a superconducting quantum processor. arXiv:2212.12372"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4163-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-024-4163-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-024-4163-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T20:27:16Z","timestamp":1774211236000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-024-4163-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,17]]},"references-count":5,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4163"],"URL":"https:\/\/doi.org\/10.1007\/s11432-024-4163-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,17]]},"assertion":[{"value":"28 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"129501"}}