{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T12:52:25Z","timestamp":1771073545650,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,14]],"date-time":"2009-04-14T00:00:00Z","timestamp":1239667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,14]]},"DOI":"10.1145\/1527017.1527028","type":"proceedings-article","created":{"date-parts":[[2009,4,15]],"date-time":"2009-04-15T13:37:11Z","timestamp":1239802631000},"page":"85-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["Quantum resistant public key cryptography"],"prefix":"10.1145","author":[{"given":"Ray A.","family":"Perlner","sequence":"first","affiliation":[{"name":"National Institute of Standards and Technology, Gaithersburg, Maryland"}]},{"given":"David A.","family":"Cooper","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology, Gaithersburg, Maryland"}]}],"member":"320","published-online":{"date-parts":[[2009,4,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276705"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258604"},{"key":"e_1_3_2_1_3_1","volume-title":"National Institute of Standards and Technology","author":"Barker E.","year":"2007"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539796300933"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_3_2_1_6_1","first-page":"514","volume-title":"7th International Conference on the Theory and Application of Cryptology and Information Security","author":"Boneh D.","year":"2001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/800105.803400"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.21214"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/602382.602398"},{"key":"e_1_3_2_1_11_1","first-page":"157","volume-title":"7th International Conference on the Theory and Application of Cryptology and Information Security","author":"Courtois N.","year":"2001"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1992.0167"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"27th Annual International Cryptology Conference","author":"Dubois V.","year":"2007"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02650179"},{"key":"e_1_3_2_1_17_1","volume-title":"National Institute of Standards and Technology","author":"FIPS","year":"2000"},{"key":"e_1_3_2_1_18_1","first-page":"89","volume-title":"10th International Conference on Practice and Theory in Public-Key Cryptography","author":"Gama N.","year":"2007"},{"key":"e_1_3_2_1_19_1","first-page":"10","volume-title":"Proceedings of CRYPTO '84","author":"Gamal T. E.","year":"1984"},{"key":"e_1_3_2_1_21_1","first-page":"182","volume-title":"International Conference on the Theory and Application of Cryptographic Techniques","author":"Gentry C.","year":"2001"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"7th International Conference on the Theory and Application of Cryptology and Information Security","author":"Gentry C.","year":"2001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706185"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_2_1_25_1","first-page":"122","volume-title":"Topics in Cryptology -- CT-RSA","author":"Hoffstein J.","year":"2003"},{"key":"e_1_3_2_1_26_1","first-page":"141","volume-title":"PQCrypto 2006: International Workshop on Post-Quantum Cryptography","author":"Hoffstein J.","year":"2006"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory (ANTS-III): Proceedings of the Third International Symposium on Algorithmic Number Theory","author":"Hoffstein J.","year":"1998"},{"key":"e_1_3_2_1_28_1","first-page":"211","volume-title":"International Conference on the Theory and Application of Cryptographic Techniques","author":"Hoffstein J.","year":"2001"},{"key":"e_1_3_2_1_29_1","first-page":"150","volume-title":"27th Annual International Cryptology Conference","author":"Howgrave-Graham N.","year":"2007"},{"key":"e_1_3_2_1_30_1","unstructured":"N. Howgrave-Graham J. H. Silverman A. Singer and W. Whyte. NAEP: Provable security in the presence of decryption failures.  N. Howgrave-Graham J. H. Silverman A. Singer and W. Whyte. NAEP: Provable security in the presence of decryption failures."},{"key":"e_1_3_2_1_31_1","first-page":"20","volume-title":"20th Annual International Cryptology Conference","author":"Joux A.","year":"2000"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_34_1","first-page":"114","volume-title":"California Institute of Technology","author":"McEliece R. J.","year":"1978"},{"key":"e_1_3_2_1_35_1","unstructured":"R. C. Merkle. Security Authentication and Public Key Systems. PhD thesis Stanford University June 1979.   R. C. Merkle. Security Authentication and Public Key Systems . PhD thesis Stanford University June 1979."},{"key":"e_1_3_2_1_36_1","first-page":"218","volume-title":"9th Annual International Cryptology Conference","author":"Merkle R. C.","year":"1989"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055927"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1167813.1705202"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/648244.753503"},{"key":"e_1_3_2_1_40_1","first-page":"417","volume-title":"Advances in Cryptology -- CRYPTO '85","author":"Miller V. S.","year":"1986"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2560"},{"key":"e_1_3_2_1_43_1","unstructured":"NTRU Announces Signature Algorithm NTRUSign viewed November 12 2008 (http:\/\/www.ntru.com\/cryptolab\/intro_ntrusign.htm).  NTRU Announces Signature Algorithm NTRUSign viewed November 12 2008 (http:\/\/www.ntru.com\/cryptolab\/intro_ntrusign.htm)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039488.1039490"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"issue":"1","key":"e_1_3_2_1_47_1","article-title":"Emerging insights on limitations of quantum computing shape quest for fast algorithms","volume":"36","author":"Robinson S.","year":"2003","journal-title":"SIAM News"},{"key":"e_1_3_2_1_48_1","first-page":"1","volume-title":"International Conference on the Theory and Application of Cryptographic Techniques","author":"Schnorr C.-P.","year":"1995"},{"key":"e_1_3_2_1_49_1","first-page":"279","volume-title":"Advances in Cryptology: Proceedings of CRYPTO '82","author":"Shamir A.","year":"1982"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_2_1_53_1","unstructured":"G. S. Vernam. US patent #1 310 719: Secret signaling system July 1919.  G. S. Vernam. US patent #1 310 719: Secret signaling system July 1919."},{"key":"e_1_3_2_1_54_1","unstructured":"W. Whyte. NTRUSign and P1363.1 Apr. 2006. http:\/\/grouper.ieee.org\/groups\/1363\/WorkingGroup\/presentations\/P1363.1-2006-04.ppt.  W. Whyte. NTRUSign and P1363.1 Apr. 2006. http:\/\/grouper.ieee.org\/groups\/1363\/WorkingGroup\/presentations\/P1363.1-2006-04.ppt."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056264"}],"event":{"name":"IDtrust '09: 8th Symposium on Identity and Trust on the Internet","location":"Gaithersburg Maryland USA","acronym":"IDtrust '09","sponsor":["Internet2","The National Institute of Standards and Technology","OASIS IDtrust Member Section","FPKIPA Federal Public Key Infrastructure Policy Authority"]},"container-title":["Proceedings of the 8th Symposium on Identity and Trust on the Internet"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1527017.1527028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1527017.1527028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:52Z","timestamp":1750253392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1527017.1527028"}},"subtitle":["a survey"],"short-title":[],"issued":{"date-parts":[[2009,4,14]]},"references-count":48,"alternative-id":["10.1145\/1527017.1527028","10.1145\/1527017"],"URL":"https:\/\/doi.org\/10.1145\/1527017.1527028","relation":{},"subject":[],"published":{"date-parts":[[2009,4,14]]},"assertion":[{"value":"2009-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}