{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:38:06Z","timestamp":1768315086440,"version":"3.49.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T00:00:00Z","timestamp":1763424000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,18]]},"DOI":"10.1109\/icspis67605.2025.11318393","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:02Z","timestamp":1768242002000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Post-Quantum Cryptography: A Review of Algorithms, Challenges, and Future Research Directions"],"prefix":"10.1109","author":[{"given":"Parth","family":"Sane","sequence":"first","affiliation":[{"name":"Atos,Software Engineering, AMS,Pune,India"}]},{"given":"Samrat P","family":"Patel","sequence":"additional","affiliation":[{"name":"University of Kentucky,Electrical and Computer Engineering Department,Lexington,KY,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/iot2010005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2018.8605630"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9846168"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS51556.2021.9401177"},{"key":"ref5","article-title":"Performance analysis and industry deployment of post-quantum cryptography algorithms","author":"Demir","year":"2025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.52783\/cana.v31.805"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography6040056"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5040033"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5040038"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2019EDL8131"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2023-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17648\/wrac-2018-97122"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04613-1_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.12105"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-020-02622-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1561\/9781680831139"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2018.i3.372-393"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.31224\/2633","article-title":"The performance analysis of post-quantum cryptography for vehicular communications","author":"Chen","year":"2022"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-0716-0987-3_5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45961-8_39"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101314"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3571071"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-15979-4_16","article-title":"Breaking rainbow takes a weekend on a laptop","volume-title":"IBM Research Blog","author":"Beullens","year":"2022"},{"key":"ref29","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","volume":"42-44","author":"McEliece","year":"1978","journal-title":"DSN Progress Report"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography5040033"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3206395"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2700102"},{"issue":"2022\/975","key":"ref33","article-title":"An efficient key recovery attack on sidh","volume-title":"Cryptology ePrint Archive","author":"Castryck","year":"2022"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966259"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2019-0034"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/10586458.2021.1926009"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxae038"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026989"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS52979.2021.00109"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1561\/0100000119"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020262"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8715020"}],"event":{"name":"2025 8th International Conference on Signal Processing and Information Security (ICSPIS)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2025,11,18]]},"end":{"date-parts":[[2025,11,20]]}},"container-title":["2025 8th International Conference on Signal Processing and Information Security (ICSPIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11318309\/11318310\/11318393.pdf?arnumber=11318393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:07:35Z","timestamp":1768295255000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11318393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,18]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/icspis67605.2025.11318393","relation":{},"subject":[],"published":{"date-parts":[[2025,11,18]]}}}