{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:46:41Z","timestamp":1761007601806,"version":"build-2065373602"},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s11623-025-2149-5","type":"journal-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T14:27:30Z","timestamp":1760970450000},"page":"610-615","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Krypto-Agilit\u00e4t als Treiber f\u00fcr Resilienz in der Datensicherheit"],"prefix":"10.1007","volume":"49","author":[{"given":"Stefan-Lukas","family":"Gazdag","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,20]]},"reference":[{"key":"2149_CR1","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Entwicklungsstand Quantencomputer, https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Informationen-und-Empfehlungen\/Quantentechnologien-und-Post-Quanten-Kryptografie\/Entwicklungsstand-Quantencomputer\/entwicklungsstand-quantencomputer_node.html"},{"key":"2149_CR2","unstructured":"National Institute of Standards and Technology and Nation Cybersecurity Center of Excellence, Migration to Post-Quantum Cryptography, https:\/\/www.nccoe.nist.gov\/crypto-agility-considerations-migrating-post-quantum-cryptographic-algorithms, https:\/\/csrc.nist.gov\/pubs\/cswp\/39\/considerations-for-achieving-cryptographic-agility\/ipd"},{"key":"2149_CR3","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Kryptografie sicher gestalten, https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Broschueren\/Kryptografie-quantensicher-gestalten.pdf?__blob=publicationFile&v=6"},{"key":"2149_CR4","unstructured":"Christian N\u00e4ther, Daniel Herzinger, Jan-Philipp Stegh\u00f6fer, Stefan-Lukas Gazdag, Eduard Hirsch und Daniel Loebenberger, Toward a Common Understanding of Cryptographic Agility -- A Systematic Review, https:\/\/arxiv.org\/abs\/2411.08781"},{"key":"2149_CR5","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik, TR-02102-1, https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR02102\/BSI-TR-02102.pdf?__blob=publicationFile"},{"key":"2149_CR6","unstructured":"Google Statistik, Nutzung von IPv6, https:\/\/www.google.com\/intl\/de\/ipv6\/statistics.html"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2149-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-025-2149-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-025-2149-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T14:27:30Z","timestamp":1760970450000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-025-2149-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":6,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2149"],"URL":"https:\/\/doi.org\/10.1007\/s11623-025-2149-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"20 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}