{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:18:20Z","timestamp":1771341500225,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3324882","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"285-285","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Post-quantum cryptography and 5G security"],"prefix":"10.1145","author":[{"given":"T. Charles","family":"Clancy","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Robert W.","family":"McGwier","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Lidong","family":"Chen","sequence":"additional","affiliation":[{"name":"National Institute of Standards and Technology"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"-Y. Initial recommendations for long-term secure post-quantum systems","author":"Augot D.","year":"2015","unstructured":"Augot , D. , Batina , L. , Bernstein , D. J. , Bos , J. , Buchmann , J. , Castryck , W. , Dunkelman , O. , Guneysu , T. , Gueron , S. , Hulsing , A. , Lange , T. , Mohamed , M. S. E. , Rechberger , C. , Schwabe , P. , Sendrier , N. , Vercauteren , F. , and Yang , B . -Y. Initial recommendations for long-term secure post-quantum systems . PQCRYPTO : Post-Quantum Cryptography for Long-Term Security , 2015 . Augot, D., Batina, L., Bernstein, D. J., Bos, J., Buchmann, J., Castryck, W., Dunkelman, O., Guneysu, T., Gueron, S., Hulsing, A., Lange, T., Mohamed, M. S. E., Rechberger, C., Schwabe, P., Sendrier, N., Vercauteren, F., and Yang, B.-Y. Initial recommendations for long-term secure post-quantum systems. PQCRYPTO: Post-Quantum Cryptography for Long-Term Security, 2015."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706185"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/648184.749737"},{"key":"e_1_3_2_1_6_1","first-page":"9","article-title":"The impact of quantum computing on present cryptography department of informatics","author":"Mavroeidis V.","year":"2018","unstructured":"Mavroeidis , V. , Vishi , K. , Zych , M. D. , and Josang , A . The impact of quantum computing on present cryptography department of informatics . International Journal of Advanced Computer Science and Applications 9 ( 2018 ). Mavroeidis, V., Vishi, K., Zych, M. D., and Josang, A. The impact of quantum computing on present cryptography department of informatics. International Journal of Advanced Computer Science and Applications 9 (2018).","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3324882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3324882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3324882"}},"subtitle":["tutorial"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":6,"alternative-id":["10.1145\/3317549.3324882","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3324882","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}