{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:03Z","timestamp":1775745303752,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T00:00:00Z","timestamp":1694131200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T00:00:00Z","timestamp":1694131200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,8]]},"DOI":"10.1109\/pkia58446.2023.10262706","type":"proceedings-article","created":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T17:33:14Z","timestamp":1695835994000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["Cryptographic Challenges and Security in Post Quantum Cryptography Migration: A Prospective Approach"],"prefix":"10.1109","author":[{"given":"Anoop Kumar","family":"Pandey","sequence":"first","affiliation":[{"name":"CDAC Bengaluru,Bengaluru,India"}]},{"given":"Aashish","family":"Banati","sequence":"additional","affiliation":[{"name":"Office of CCA,New Delhi,India"}]},{"given":"Balaji","family":"Rajendran","sequence":"additional","affiliation":[{"name":"CDAC Bengaluru,Bengaluru,India"}]},{"given":"S D","family":"Sudarsan","sequence":"additional","affiliation":[{"name":"CDAC Bengaluru,Bengaluru,India"}]},{"given":"K K Soundra","family":"Pandian","sequence":"additional","affiliation":[{"name":"Office of CCA,New Delhi,India"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363229"},{"key":"ref12","article-title":"Falcon","author":"prest","year":"2020","journal-title":"NIST POST-QUANTUM CRYPTO PROJECT"},{"key":"ref15","year":"2021","journal-title":"Etsi technical report on quantum safe public key encryption and key encapsulation"},{"key":"ref14","year":"2021","journal-title":"Etsi technical report on quantum safe signatures"},{"key":"ref11","author":"fouque","year":"2019","journal-title":"Fast-fourier latticebased compact signatures over ntru"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref2","article-title":"Nist status update on the 3rd round","author":"moody","year":"2021","journal-title":"Cryptography Technology Group National Institute of Standards and Technology"},{"key":"ref1","year":"2016","journal-title":"Post-quantum cryptography PQC"},{"key":"ref17","year":"2022","journal-title":"Toppan and nict establish world's first technology for equipping smart card systems with post-quantum cryptography selected by nist"},{"key":"ref16","year":"2021","journal-title":"Activities on pqc in japan"},{"key":"ref19","year":"2019","journal-title":"Notice on announcing the results of the first round of algorithm selection in the national encryption algorithm design competition"},{"key":"ref18","year":"2020","journal-title":"Preparing for quantum-safe cryptography"},{"key":"ref24","year":"0","journal-title":"The google new"},{"key":"ref23","year":"0","journal-title":"Microsoft post-quantum cryptography"},{"key":"ref26","year":"0","journal-title":"Ibm quantum-safe cryptography"},{"key":"ref25","year":"0","journal-title":"Infineon contactless pqc chip"},{"key":"ref20","year":"2020","journal-title":"Announcement on the algorithm selection results of the national cryptography algorithm design competition"},{"key":"ref22","year":"0","journal-title":"Open Quantum Safe Project"},{"key":"ref21","year":"2022","journal-title":"Kpqc competition round 1"},{"key":"ref27","year":"2023","journal-title":"Tutoring system for digital signature (pqc)"},{"key":"ref8","author":"lamport","year":"1979","journal-title":"Constructing digital signatures from a one way function"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.79.325"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"}],"event":{"name":"2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","location":"Bangalore, India","start":{"date-parts":[[2023,9,8]]},"end":{"date-parts":[[2023,9,9]]}},"container-title":["2023 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10262405\/10262411\/10262706.pdf?arnumber=10262706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:57:11Z","timestamp":1697479031000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10262706\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/pkia58446.2023.10262706","relation":{},"subject":[],"published":{"date-parts":[[2023,9,8]]}}}