{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:41:37Z","timestamp":1760074897378,"version":"build-2065373602"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185711","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"553-558","source":"Crossref","is-referenced-by-count":0,"title":["Post-Quantum Security Enhancements for the TRISA Framework: A Technical Perspective"],"prefix":"10.1109","author":[{"given":"Ruslan","family":"Shevchuk","sequence":"first","affiliation":[{"name":"University of Bielsko-Biala,Department of Computer Science and Automatics,Bielsko-Biala,Poland"}]},{"given":"Bogdan","family":"Adamyk","sequence":"additional","affiliation":[{"name":"Aston University,Aston Business School,Birmingham,United Kingdom"}]},{"given":"Vladlena","family":"Benson","sequence":"additional","affiliation":[{"name":"Aston University,Aston Business School,Birmingham,United Kingdom"}]}],"member":"263","reference":[{"year":"2025","key":"ref1","article-title":"State of crypto 2025: The readiness of the digital asset ecosystem"},{"volume-title":"The chainalysis 2025 crypto crime report","year":"2025","key":"ref2"},{"year":"2021","key":"ref3","article-title":"Cryptocurrencies: Tracing the evolution of criminal finances"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10657-024-09797-w"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3386428"},{"volume-title":"International standards on combating money laundering and the financing of terrorism & proliferation","year":"2025","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC59979.2024.10634360"},{"year":"2021","key":"ref8","article-title":"Trisa whitepaper: A protocol for compliant cryptocurrency travel rule information sharing"},{"volume-title":"Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations.","year":"2003","author":"Adams","key":"ref9"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5246","article-title":"The transport layer security (tls) protocol version 1.2","author":"Dierks","year":"2008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3564447"},{"year":"2024","key":"ref13","article-title":"Transition to post-quantum cryptography standards (initial public draft)"},{"volume-title":"Organizations lack a quantum computing roadmap, isaca finds","year":"2025","key":"ref14"},{"volume-title":"Fips 203: Module-lattice-based key-encapsulation mechanism standard (ml-kem)","year":"2024","key":"ref15"},{"year":"2024","key":"ref16","article-title":"Fips 204: Module-lattice-based digital signature algorithm standard (ml-dsa)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"article-title":"Itu-t recommendation x.509: Information technology \u2014 open systems interconnection \u2014 the directory: Public-key and attribute certificate frameworks","year":"2019","author":"Union","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7030040"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100242"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-6383-4_3"},{"article-title":"X. 509 information security certification based on post-quantum cryptography","year":"2024","author":"Chen","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSES62373.2024.10561274"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2021.117887"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01606"},{"key":"ref27","article-title":"Prototyping post-quantum and hybrid key exchange and authentication in tls and ssh","author":"Crockett","year":"2019","journal-title":"Cryptology ePrint Archive"},{"year":"2024","key":"ref28","article-title":"Quantum-safe cryptography in tls in ibm cloud key protect"},{"key":"ref29","article-title":"Towards post-quantum cryptography in tls","volume-title":"Cloud-flare Blog","author":"Kwiatkowski","year":"2019"},{"journal-title":"AWS Documentation","article-title":"Using hybrid post-quantum tls with aws kms","year":"2024","key":"ref30"},{"journal-title":"FIPS Publication 204","article-title":"Module-lattice-based digital signature standard","year":"2024","key":"ref31"},{"volume-title":"wolfssl manual: Embedded ssl\/tls library documentation","year":"2025","key":"ref32"},{"year":"2025","key":"ref33","article-title":"Open quantum safe project"},{"article-title":"Advanced encryption standard (aes) (fips publication 197)","volume-title":"FIPS Publication 197","year":"2001","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8439"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref37","article-title":"Hybrid public key encryption (hpke)","volume-title":"RFC 9180","author":"Wood","year":"2022"},{"article-title":"Secure hash standard (shs)","volume-title":"FIPS PUB 180-4","year":"2015","key":"ref38"},{"journal-title":"NSA Suite B Cryptography","article-title":"Commercial national security algorithm suite and quantum computing standards","year":"2020","key":"ref39"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185711.pdf?arnumber=11185711","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:04:23Z","timestamp":1760072663000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185711\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185711","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}