{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T10:10:08Z","timestamp":1743243008803,"version":"3.40.3"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11623-025-2061-z","type":"journal-article","created":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T09:34:23Z","timestamp":1743240863000},"page":"153-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantencomputer und ihre Sicherheitsfolgen"],"prefix":"10.1007","volume":"49","author":[{"given":"Derk","family":"Frerichs-Mihov","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Beirer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,28]]},"reference":[{"key":"2061_CR1","unstructured":"R. Gundlach: Post-Quanten-Kryptographie \u2013 Wirksame kryptographische Verfahren f\u00fcr die Zukunft. GAI NetConsult GmbH: Security Journal # 124, Dezember 2022"},{"key":"2061_CR2","unstructured":"Infineon Technologies AG: Quantencomputing: Schl\u00fcsseltechnologie des 21.\u00a0Jahrhunderts. November 2021, https:\/\/www.infineon.com\/cms\/de\/discoveries\/quantum-computing\/ (abgerufen am 13.01.2025)"},{"key":"2061_CR3","unstructured":"NSA Media Relations: NSA Releases Future Quantum-Resistant (QR) Algorithm Requirements for National Security Systems. National Security Agency\/Central Security Service, September 2022, https:\/\/www.nsa.gov\/Press-Room\/News-Highlights\/Article\/Article\/3148990\/nsa-releases-future-quantum-resistant-qr-algorithm-requirements-for-national-se\/ (abgerufen am 13.01.2025)"},{"key":"2061_CR4","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Quantentechnologien und quantensichere Kryptografie. https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Informationen-und-Empfehlungen\/Quantentechnologien-und-Post-Quanten-Kryptografie\/quantentechnologien-und-quantensichere-kryptografie_node.html (abgerufen am 13.01.2025)"},{"key":"2061_CR5","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Securing Tomorrow, Today: Transitioning to Post-Quantum Cryptography. 30. November 2024, https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Crypto\/PQC-joint-statement.html?nn=129156#Download=1 (abgerufen am 13.01.2025)"},{"key":"2061_CR6","unstructured":"Chad Boutin: NIST Releases First 3 Finalized Post-Quantum Encryption Standards. National Institute of Standards and Technology, 26. August 2024, https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards (abgerufen am 13.01.2025)"},{"key":"2061_CR7","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Kryptografie quantensicher gestalten. 15. Dezember 2021, https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Broschueren\/Kryptografie-quantensicher-gestalten.html (abgerufen am 13.01.2025)"},{"key":"2061_CR8","unstructured":"Cybersecurity and Infrastructure Security Agency, National Security Agency, National Institute of Standards and Technology: Quantum-readiness: Migration to Post-quantum Cryptography. 17. August 2023"},{"key":"2061_CR9","unstructured":"Thomas Attema, Jo\u00e3o Diogo Duarte, Vincent Dunning, Matthieu Lequesne, Ward van der Schoot, Marc Stevens, AIVD Cryptologists & Security Advisors: The PQC Migration Handbook \u2013 Guidelines For Migrating To Post-Quantum Cryptography. Version 2, Dezember 2023, https:\/\/english.aivd.nl\/publications\/publications\/2023\/04\/04\/the-pqc-migration-handbook (abgerufen am 13.01.2025)"},{"key":"2061_CR10","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen. BSI TR-02102-1, Version: 2024-01, 2. Februar 2024"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2061-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2061-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2061-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T09:34:23Z","timestamp":1743240863000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2061-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":10,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["2061"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2061-z","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"28 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}