{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:16:07Z","timestamp":1775470567185,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T00:00:00Z","timestamp":1679443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T00:00:00Z","timestamp":1679443200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,22]]},"DOI":"10.1109\/ciss56502.2023.10089619","type":"proceedings-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T14:58:36Z","timestamp":1681138716000},"page":"1-6","source":"Crossref","is-referenced-by-count":18,"title":["An Overview of Quantum-Safe Approaches: Quantum Key Distribution and Post-Quantum Cryptography"],"prefix":"10.1109","author":[{"given":"Guobin","family":"Xu","sequence":"first","affiliation":[{"name":"Morgan State University,The Department of Computer Science,Baltimore,USA"}]},{"given":"Jianzhou","family":"Mao","sequence":"additional","affiliation":[{"name":"Morgan State University,The Department of Computer Science,Baltimore,USA"}]},{"given":"Eric","family":"Sakk","sequence":"additional","affiliation":[{"name":"Morgan State University,The Department of Computer Science,Baltimore,USA"}]},{"given":"Shuangbao Paul","family":"Wang","sequence":"additional","affiliation":[{"name":"Morgan State University,The Department of Computer Science,Baltimore,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.057901"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"ref34","year":"2022","journal-title":"Reuters Bt and toshiba trial first commercial quantum-secured network"},{"key":"ref15","article-title":"Fujitsu","year":"0","journal-title":"University of tokyo fujitsu and nec succeed in quantum key distribution from single-photon emitter at world-record distance of 120 km"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"ref14","article-title":"Falcon: Fast-fourier lattice-based compact signatures over ntru","volume":"36","author":"fouque","year":"2018","journal-title":"Submission to the NIST's post-quantum cryptography standardization process"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref31","article-title":"Qubitekk","year":"0","journal-title":"Qubitekk acquires quantum key distribution patent portfolio"},{"key":"ref30","article-title":"QuantumCTek","year":"0","journal-title":"Quantumctek qkd products"},{"key":"ref11","first-page":"1","article-title":"Quantum cryptography on ibm qx","author":"dhoha","year":"0","journal-title":"2019 2nd International Conference on Computer Applications & Information Security (ICCAIS)"},{"key":"ref33","article-title":"L. Reading","year":"0","journal-title":"Magiq demos quantum cryptography"},{"key":"ref10","author":"chatterjee","year":"2019","journal-title":"qkdsim An experimenter's simulation toolkit for qkd with imperfections and its performance analysis with a demonstration of the b92 protocol using heralded photon"},{"key":"ref32","article-title":"QuintessenceLabs","year":"0","journal-title":"qoptica 100 quantum key distribution (qkd)"},{"key":"ref2","first-page":"1","article-title":"Crystals-kyber algorithm specifications and supporting documentation","volume":"2","author":"avanzi","year":"2017","journal-title":"NIST PQC Round"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ECS.2015.7124946"},{"key":"ref17","author":"gisin","year":"2004","journal-title":"Towards practical and fast Quantum Cryptography"},{"key":"ref39","author":"xchange","year":"0","journal-title":"Cio's guide for implementing quantum-safe key delivery Positioning your business for a quantum-safe future"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.22331\/q-2021-04-15-433","article-title":"How to factor 2048 bit rsa integers in 8 hours using 20 million noisy qubits","volume":"5","author":"gidney","year":"2021","journal-title":"Quantum"},{"key":"ref38","author":"wang","year":"2020","journal-title":"Quantum cryptography and simulation Tools and techniques"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.057902"},{"key":"ref18","first-page":"56","article-title":"Review of modern quantum key distribution protocols","volume":"4","author":"gnatyuk","year":"2020","journal-title":"Sci Practical Cyber Secur J"},{"key":"ref24","year":"0","journal-title":"IDQ Idq quantum-safe security products"},{"key":"ref23","year":"0","journal-title":"IDQ Geneva government 1g encryption with qkd"},{"key":"ref26","article-title":"A review of quantum key distribution protocols in the perspective of smart grid communication security","author":"kong","year":"2020","journal-title":"IEEE Systems Journal"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.037902"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.79.325"},{"key":"ref22","year":"0","journal-title":"IBM Expanding the ibm quantum roadmap to anticipate the future of quantum-centric supercomputing"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.95.042301"},{"key":"ref28","article-title":"N. I. of Standards and T. (NIST)","year":"0","journal-title":"Nist announces first four quantum-resistant cryptographic algorithms"},{"key":"ref27","author":"magiq qpn","year":"0","journal-title":"State of the art quantum cryptography"},{"key":"ref29","year":"0","journal-title":"U of Waterloo What is a qubit?"},{"key":"ref8","article-title":"Optimal eavesdropping in quantum cryptography with six states","volume":"81","author":"bru?","year":"1998","journal-title":"Physical Review Letters"},{"key":"ref7","first-page":"353","article-title":"Crystals-kyber: a cca-secure module-lattice-based kem","author":"bos","year":"0","journal-title":"2018 IEEE European Symposium on Security and Privacy (EuroS&P) IEEE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIEA.2012.6496677"},{"key":"ref4","author":"bennett","year":"2020","journal-title":"Quantum Cryptography Public Key Distribution and Coin Tossing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.3121"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.557"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1364\/OE.26.024260"}],"event":{"name":"2023 57th Annual Conference on Information Sciences and Systems (CISS)","location":"Baltimore, MD, USA","start":{"date-parts":[[2023,3,22]]},"end":{"date-parts":[[2023,3,24]]}},"container-title":["2023 57th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10089615\/10089616\/10089619.pdf?arnumber=10089619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T14:20:11Z","timestamp":1682950811000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10089619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,22]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/ciss56502.2023.10089619","relation":{},"subject":[],"published":{"date-parts":[[2023,3,22]]}}}