{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T11:42:02Z","timestamp":1778154122398,"version":"3.51.4"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Institute for Information &amp; Communications Technology Planning &amp; Evaluation"},{"name":"Korean government (MSIT) (&lt;Q &vert; Crypton&gt;","award":["2019-0-00033"],"award-info":[{"award-number":["2019-0-00033"]}]},{"name":"Study on Quantum Security Evaluation of Cryptography based on Computational Quantum Complexity&#x201D;"},{"name":"Wallenberg-NTU Presidential Post-Doctorate Fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tetc.2025.3546648","type":"journal-article","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T13:41:58Z","timestamp":1741354918000},"page":"919-934","source":"Crossref","is-referenced-by-count":13,"title":["Quantum Implementation and Analysis of SHA-2 and SHA-3"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5963-7127","authenticated-orcid":false,"given":"Kyungbae","family":"Jang","sequence":"first","affiliation":[{"name":"Department of IT Convergence Engineering, Hansung University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7186-8104","authenticated-orcid":false,"given":"Sejin","family":"Lim","sequence":"additional","affiliation":[{"name":"Department of IT Convergence Engineering, Hansung University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6693-277X","authenticated-orcid":false,"given":"Yujin","family":"Oh","sequence":"additional","affiliation":[{"name":"Department of IT Convergence Engineering, Hansung University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6757-6109","authenticated-orcid":false,"given":"Hyunjun","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of IT Convergence Engineering, Hansung University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5639-7372","authenticated-orcid":false,"given":"Anubhab","family":"Baksi","sequence":"additional","affiliation":[{"name":"School of Physical &#x0026; Mathematical Sciences, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0260-9891","authenticated-orcid":false,"given":"Sumanta","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Techno International New Town (TINT), West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0069-9061","authenticated-orcid":false,"given":"Hwajeong","family":"Seo","sequence":"additional","affiliation":[{"name":"Department of IT Convergence Engineering, Hansung University, Seoul, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref3","article-title":"Call for additional digital signature schemes for the post-quantum cryptography standardization process","year":"2022"},{"key":"ref4","article-title":"Submission requirements and evaluation criteria for the post-quantum cryptography standardization process","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12074"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2107-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-021-00514-y"},{"key":"ref9","article-title":"Lowering the T-depth of quantum circuits by reducing the multiplicative depth of logic networks","author":"H\u00e4ner","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/app13063558"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-024-04365-2"},{"key":"ref12","article-title":"Quantum carry-save arithmetic","author":"Gossett","year":"1998","journal-title":"arXiv:quant-ph\/9808061"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_10"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-99-8727-6_3","article-title":"Improved quantum circuits for AES: Reducing the depth and the number of qubits","volume-title":"Cryptol. ePrint Arch.","author":"Liu","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_24"},{"key":"ref16","article-title":"Quantum analysis of AES","volume-title":"Cryptol. ePrint Arch.","author":"Jang","year":"2022"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.22331\/q-2018-01-31-49"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2013.2244643"},{"issue":"4","key":"ref19","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.87.042302","article-title":"Quantum circuits of T-depth one","volume":"87","author":"Selinger","year":"2013","journal-title":"Phys. Rev. A"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/305\/05215"},{"key":"ref23","first-page":"1","article-title":"On the practical cost of Grover for AES key recovery","volume-title":"Proc. 5th PQC Standardization Conf.","author":"Sarah"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.26421\/qic20.9-10-1"},{"key":"ref25","article-title":"A new quantum ripple-carry addition circuit","volume-title":"arXiv:quant-ph\/0410184","author":"Cuccaro","year":"2008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.26421\/qic6.4-5-4"},{"key":"ref27","article-title":"Quantum addition circuits and unbounded fan-out","author":"Takahashi","year":"2009"},{"key":"ref28","article-title":"Tree-based quantum carry save adder","author":"Kim","year":"2025"},{"key":"ref29","article-title":"Post-quantum cryptography standardization historical FAQs","year":"2016"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6245516\/11159571\/10918610.pdf?arnumber=10918610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T04:49:04Z","timestamp":1757652544000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10918610\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":29,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2025.3546648","relation":{},"ISSN":["2168-6750","2376-4562"],"issn-type":[{"value":"2168-6750","type":"electronic"},{"value":"2376-4562","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}