{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T00:09:25Z","timestamp":1773878965791,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T00:00:00Z","timestamp":1684800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,23]]},"DOI":"10.1109\/saci58269.2023.10158562","type":"proceedings-article","created":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T13:26:49Z","timestamp":1687872409000},"page":"000077-000082","source":"Crossref","is-referenced-by-count":11,"title":["Public Key Infrastructure in the Post-Quantum Era"],"prefix":"10.1109","author":[{"given":"Fruzsina","family":"Bene","sequence":"first","affiliation":[{"name":"ELTE E&#x00f6;tv&#x00f6;s Lor&#x00E1;nd University,Department of Information Systems,Budapest,Hungary,1117"}]},{"given":"Attila","family":"Kiss","sequence":"additional","affiliation":[{"name":"ELTE E&#x00f6;tv&#x00f6;s Lor&#x00E1;nd University,Department of Information Systems,Budapest,Hungary,1117"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1140\/epjqt\/s40507-021-00104-z"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icccn52240.2021.9522179"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59879-6_22"},{"key":"ref4","article-title":"Post-quantum key exchange-A New Hope","volume-title":"USENIX security symposium","author":"Erdem"},{"key":"ref5","volume-title":"Status report on the third round of the NIST post-quantum cryptography standardization process","author":"Gorjan","year":"2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/iiphdw.2019.8755433"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59879-6_22"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/icmu.2017.8330093"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icon.2001.962346"},{"key":"ref10","volume-title":"Implementing SSL\/TLS using cryptography and PKI","author":"Joshua","year":"2011"},{"key":"ref11","article-title":"Understanding PKI: concepts, standards, and deployment considerations","author":"Carlisle","year":"2003","journal-title":"Addison-Wesley Professional"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008354106356"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"ref17","article-title":"On Ideal Lattices and Learning with Errors Over Rings","author":"Lyubashevsky","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"ref19","first-page":"14","article-title":"Post-quantum key exchange for the internet and the open quantum safe project","volume-title":"Selected Areas in Cryptography\u2013SAC 2016: 23rd International Conference, St. Johns, NL, Canada, August 10-12, 2016, Revised Selected Papers","author":"Douglas"},{"key":"ref20","volume-title":"BIKE: bit flipping key encapsulation","author":"Nicolas","year":"2017"},{"key":"ref21","volume-title":"BIKE: bit flipping key encapsulation-Round 4 Submission","author":"Nicolas","year":"2022"},{"key":"ref22","volume-title":"Classic McEliece: conservative code-based cryptography","author":"Tung","year":"2020"},{"key":"ref23","volume-title":"Hamming quasi-cyclic (HQC)","author":"Carlos Aguilar","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2018.00032"},{"key":"ref25","article-title":"CRYSTALS-Kyber-Algorithm Specifications And Supporting Documentation (version 3.0)","author":"Bos","year":"2020"},{"key":"ref26","article-title":"NTRU-Algorithm specifications and supporting documentation (Round 3 Submission)","volume-title":"Tech. Rep.","author":"C","year":"2020"},{"key":"ref27","article-title":"Falcon: Fast-Fourier lattice-based compact signatures over NTRU","author":"Pierre-Alain","year":"2020","journal-title":"Submission to the NISTs post-quantum cryptography standardization process"},{"issue":"1","key":"ref28","article-title":"SPHINCS+\u201d Submission to the NIST post-quantum project","volume":"3","author":"Aumasson","year":"2022"},{"key":"ref29","volume-title":"Crystals-dilithium. Algorithm Specifications and Supporting Documentation","author":"Vadim","year":"2020"},{"key":"ref30","article-title":"Submission requirements and evaluation criteria for the postquantum cryptography standardization process","year":"2016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11586821_1"},{"issue":"6","key":"ref32","first-page":"8","article-title":"The impact of quantum computing on cryptography, Computer Fraud & Security","volume":"2017","author":"Aumasson","year":"2017"},{"key":"ref33","first-page":"131","article-title":"Regev, O.: Lattice-based cryptography","year":"2006","journal-title":"Advances in cryptology (CRYPTO)"}],"event":{"name":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","location":"Timisoara, Romania","start":{"date-parts":[[2023,5,23]]},"end":{"date-parts":[[2023,5,26]]}},"container-title":["2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10158523\/10158534\/10158562.pdf?arnumber=10158562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T00:28:22Z","timestamp":1710376102000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10158562\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,23]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/saci58269.2023.10158562","relation":{},"subject":[],"published":{"date-parts":[[2023,5,23]]}}}