{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:18:25Z","timestamp":1775326705117,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T00:00:00Z","timestamp":1702252800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T00:00:00Z","timestamp":1702252800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,11]]},"DOI":"10.1109\/soli60636.2023.10425346","type":"proceedings-article","created":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T18:37:49Z","timestamp":1707935869000},"page":"1-6","source":"Crossref","is-referenced-by-count":15,"title":["A Survey on Post-Quantum Cryptography for 5G\/6G Communications"],"prefix":"10.1109","author":[{"given":"Rongjie","family":"Zhou","sequence":"first","affiliation":[{"name":"Singapore Institute of Technology &#x0026; WizVision Pte Ltd,Singapore"}]},{"given":"Huaqun","family":"Guo","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology,Singapore"}]},{"given":"Francis E C","family":"Teo","sequence":"additional","affiliation":[{"name":"WizVision Pte Ltd,Singapore"}]},{"given":"Spiridon","family":"Bakiras","sequence":"additional","affiliation":[{"name":"Singapore Institute of Technology,Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.019"},{"key":"ref2","volume-title":"The Mobile Economy","year":"2023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icengtechnol.2017.8308215"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/platcon53246.2021.9680752"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw59978.2023.00065"},{"key":"ref6","article-title":"How SSL and TLS provide identification authentication confidentiality and integrity","year":"2018","journal-title":"IBM MQ 7.5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/iceta.2011.6112567"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/punecon52575.2021.9686492"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/pacet56979.2022.9976365"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tbc.2020.3031742"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3105185"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1592-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/saci58269.2023.10158562"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/saci58269.2023.10158562"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/iccca49541.2020.9250806"},{"key":"ref17","article-title":"Factoring integers with sublinear resources on a superconducting quantum processor","author":"Yan","year":"2022","journal-title":"arxiv"},{"key":"ref18","volume-title":"The IBM Quantum Development Roadmap","year":"2023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icces57224.2023.10192607"},{"key":"ref20","article-title":"Securing tomorrow today: Why Google now protects its internal communications from quantum threats","year":"2023","journal-title":"Google cloud"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2023.3309051"},{"key":"ref22","volume-title":"Security for 5G Service-Base Architecture: What you need to know","author":"Jose","year":"2023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/mobisecserv50855.2022.9727214"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3274599"},{"key":"ref25","article-title":"Energy Consumption of Post Quantum Cryptography: Dilithium and Kyber Beat Our Existing TLS 1.3 Performance","author":"Obe","year":"2023","journal-title":"ASecuritySite: When Bob Met Alice"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3587135.3592821"},{"key":"ref27","volume-title":"PQC Key Encapsulation Mechanism (KEM) Speed Tests","author":"Buchanan","year":"2023"},{"key":"ref28","volume-title":"PQC Digital Signature Speed Tests","author":"Buchanan","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3040324"},{"key":"ref30","article-title":"Post-quantum hybrid SFTP file transfers using AWS Transfer Family","author":"Kampanakis","year":"2023","journal-title":"AWS Security Blog"},{"key":"ref31","article-title":"How to tune TLS for hybrid post-quantum cryptography with Kyber","author":"Jarvis","year":"2022","journal-title":"AWS Security Blog"},{"key":"ref32","article-title":"Available on IBM z16: Future-Proof Digital Signatures with a Quantum-Safe Algorithm Selected by NIST","author":"Dames","year":"2022","journal-title":"IBM Blog"},{"key":"ref33","article-title":"Defending against future threats: Cloudflare goes post-quantum","author":"Westerbaan","year":"2022","journal-title":"The Cloudflare Blog"},{"key":"ref34","article-title":"Post-quantum crypto should be free, so were including it for free, forever","author":"Evans","year":"2023","journal-title":"The Cloudflare Blog"}],"event":{"name":"2023 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)","location":"Singapore","start":{"date-parts":[[2023,12,11]]},"end":{"date-parts":[[2023,12,13]]}},"container-title":["2023 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10424968\/10425011\/10425346.pdf?arnumber=10425346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T08:31:35Z","timestamp":1710405095000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10425346\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/soli60636.2023.10425346","relation":{},"subject":[],"published":{"date-parts":[[2023,12,11]]}}}