{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:29:34Z","timestamp":1755793774460,"version":"3.44.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,2]]},"DOI":"10.1109\/icbc64466.2025.11114696","type":"proceedings-article","created":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:34:30Z","timestamp":1755196470000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Towards Building Post-Quantum Secure Ethereum"],"prefix":"10.1109","author":[{"given":"Howell","family":"Liu","sequence":"first","affiliation":[{"name":"Imperial College London,United Kingdom"}]},{"given":"Zhipeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Imperial College London,United Kingdom"}]},{"given":"William","family":"Knottenbelt","sequence":"additional","affiliation":[{"name":"Imperial College London,United Kingdom"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Secp256k1","year":"2024","journal-title":"Bitcoin Wiki"},{"key":"ref2","article-title":"Ethereum: A next-generation smart contract and decentralized application platform","author":"Buterin","year":"2014"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04159-4_20"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/nist.ir.8105"},{"key":"ref6","article-title":"Migration to post-quantum cryptography","year":"2024"},{"key":"ref7","article-title":"imessage with pq3: The new state of the art in quantum-secure messaging at scale","year":"2024"},{"key":"ref8","volume-title":"Zoom bolsters security offering with the inclusion of post-quantum end-to-end encryption in zoom workplace","year":"2024"},{"key":"ref9","article-title":"Ethereum prepares for quantum-resistant future amid security push","author":"Swayne","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3325761"},{"key":"ref11","article-title":"Preparation for post-quantum era: a survey about blockchain schemes from a post-quantum perspective","author":"Ciulei","year":"2022","journal-title":"Cryptology ePrint Archive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"issue":"5","key":"ref13","first-page":"1","article-title":"Falcon: Fast-fourier lattice-based compact signatures over ntru","volume":"36","author":"Fouque","year":"2018","journal-title":"Submission to the NIST\u2019s post-quantum cryptography standardization process"},{"key":"ref14","article-title":"Falcon: Fast-fourier lattice-based compact signatures over ntru","author":"Fouque","year":"2020","journal-title":"specification, NIST"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1978.1089772"},{"key":"ref16","article-title":"Networking layer","year":"2024"},{"key":"ref17","first-page":"125","article-title":"On the efficiency of pollard\u2019s rho method for discrete logarithms","volume-title":"Proceedings of the Fourteenth Symposium on Computing: The Australasian Theory - Volume 77, CATS \u201908, (AUS)","author":"Bai"},{"key":"ref18","article-title":"Nist announces first four quantum-resistant cryptographic algorithms","year":"2022","journal-title":"News release from the U.S. Department of Commerce\u2019s National Institute of Standards and Technology"},{"key":"ref19","article-title":"Nist releases first 3 finalized post-quantum encryption standards","year":"2024","journal-title":"NIST News Release"},{"key":"ref20","article-title":"The sis problem and cryptographic applications","author":"Micciancio","year":"2020","journal-title":"Lecture slides from Simons Institute for the Theory of Computing"},{"key":"ref21","article-title":"Reth book","year":"2024","journal-title":"Documentation for Reth users and developers"},{"issue":"7623","key":"ref22","article-title":"Eip-7623: Increase calldata cost","author":"Wahrstatter","year":"2024","journal-title":"Ethereum Improvement Proposals"},{"key":"ref23","article-title":"Economic indicators","year":"2024"},{"key":"ref24","article-title":"Opcodes for the evm","year":"2024"}],"event":{"name":"2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Pisa, Italy","start":{"date-parts":[[2025,6,2]]},"end":{"date-parts":[[2025,6,6]]}},"container-title":["2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11114381\/11114414\/11114696.pdf?arnumber=11114696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T05:07:19Z","timestamp":1755234439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11114696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icbc64466.2025.11114696","relation":{},"subject":[],"published":{"date-parts":[[2025,6,2]]}}}