{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:06:42Z","timestamp":1774966002191,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100019862","name":"Ruppin Academic Center","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019862","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185847","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"532-536","source":"Crossref","is-referenced-by-count":1,"title":["Implementing Post-Quantum Cyber Security in Financial Systems"],"prefix":"10.1109","author":[{"given":"Nadav","family":"Voloch","sequence":"first","affiliation":[{"name":"Ruppin Academic Center,Computer Engineering Department,Israel"}]},{"given":"Noa","family":"Voloch - Bloch","sequence":"additional","affiliation":[{"name":"Raicol Crystals Ltd,Rosh Ha&#x2019;Ayin,Israel"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref2","article-title":"Post-Quantum Cryptography Standardization","year":"2022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423350"},{"key":"ref5","article-title":"Post-quantum key exchange\u2014A new hope","volume-title":"Proceedings of the 25th USENIX Security Symposium","author":"Alkim"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2018.127"},{"key":"ref7","article-title":"Mitigating multi-target attacks in hash-based signatures with key-updating mechanisms","volume-title":"Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS)","author":"H\u00fclsing"},{"key":"ref8","article-title":"FrodoKEM, BIKE, and NTRUEncrypt submissions","year":"2022"},{"key":"ref9","article-title":"Hybrid key exchange in TLS 1.3","volume-title":"Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS)","author":"Bindel"},{"issue":"1","key":"ref10","first-page":"237","article-title":"CRYSTALS-Kyber and CRYSTALS-Dilithium: Strong and efficient post-quantum cryptography","volume":"2018","author":"Bos","year":"2018","journal-title":"IEEE Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2013.5310"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63594-7_74"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.005"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/jcp1010006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.197"},{"key":"ref16","first-page":"159","article-title":"RSA chips (past\/present\/future)","volume-title":"Advances in Cryptology: Proceedings of EUROCRYPT 84 A Workshop on the Theory and Application of Cryptographic Techniques","volume":"3","author":"Rivest"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2014.02.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139012843"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-9003-7","volume-title":"Introduction to cryptography","volume":"335","author":"Buchmann","year":"2004"},{"issue":"8","key":"ref20","first-page":"972","article-title":"The uneasy relationship between mathematics and cryptography","volume":"54","author":"Koblitz","year":"2007","journal-title":"Notices of the AMS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.12988\/ces.2017.79101"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT62333.2024.10712620"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-78416-3_11"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","location":"Sibenik, Croatia","start":{"date-parts":[[2025,9,17]]},"end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185847.pdf?arnumber=11185847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:27:26Z","timestamp":1760074046000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185847","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}