{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T04:11:29Z","timestamp":1775707889342,"version":"3.50.1"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2020,10,26]]},"abstract":"<jats:p>\n            Quantum computing is threatening\n            <jats:italic>current<\/jats:italic>\n            cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development. These new algorithms differ significantly from current ones. They can have larger signatures or keys, and often require more computational power. This means we cannot just replace existing algorithms by PQC alternatives, but need to evaluate if they meet the requirements of the Internet protocols that rely on them.\n          <\/jats:p>\n          <jats:p>In this paper we provide a case study, analyzing the impact of PQC on the Domain Name System (DNS) and its Security Extensions (DNSSEC). In its main role, DNS translates human-readable domain names to IP addresses and DNSSEC guarantees message integrity and authenticity. DNSSEC is particularly challenging to transition to PQC, since DNSSEC and its underlying transport protocols require small signatures and keys and efficient validation. We evaluate current candidate PQC signature algorithms in the third round of the NIST competition on their suitability for use in DNSSEC. We show that three algorithms, partially, meet DNSSEC's requirements but also show where and how we would still need to adapt DNSSEC. Thus, our research lays the foundation for making DNSSEC, and protocols with similar constraints ready for PQC.<\/jats:p>","DOI":"10.1145\/3431832.3431838","type":"journal-article","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T16:21:53Z","timestamp":1603729313000},"page":"49-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Retrofitting post-quantum cryptography in internet protocols"],"prefix":"10.1145","volume":"50","author":[{"given":"Moritz","family":"M\u00fcller","sequence":"first","affiliation":[{"name":"University of Twente"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jins","family":"de Jong","sequence":"additional","affiliation":[{"name":"TNO"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maran","family":"van Heesch","sequence":"additional","affiliation":[{"name":"TNO"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benno","family":"Overeinder","sequence":"additional","affiliation":[{"name":"NLnet Labs"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roland","family":"van Rijswijk-Deij","sequence":"additional","affiliation":[{"name":"University of Twente"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3748"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Gorjan Alagic Jacob Alperin-Sheriff Daniel Apon David Cooper Quynh Dang John Kelsey Yi-Kai Liu Carl Miller Dustin Moody Rene Peralta etal 2020. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. US Department of Commerce National Institute of Standards and Technology.  Gorjan Alagic Jacob Alperin-Sheriff Daniel Apon David Cooper Quynh Dang John Kelsey Yi-Kai Liu Carl Miller Dustin Moody Rene Peralta et al. 2020. Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process. US Department of Commerce National Institute of Standards and Technology.","DOI":"10.6028\/NIST.IR.8240"},{"key":"e_1_2_1_4_1","unstructured":"Alexa. 2020. Top 1M sites from 2020-07-14. http:\/\/s3.dualstack.us-east-1.amazonaws.com\/alexa-static\/top-1m.csv.zip.  Alexa. 2020. Top 1M sites from 2020-07-14. http:\/\/s3.dualstack.us-east-1.amazonaws.com\/alexa-static\/top-1m.csv.zip."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4033"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4035"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4034"},{"key":"e_1_2_1_8_1","volume-title":"Babbush","author":"Arute F.","year":"2019","unstructured":"F. Arute , K. Arya , and R. et al Babbush . 2019 . Quantum Supremacy Using a Programmable Superconducting Processor. Nature 574 (oct 2019), 505--510. F. Arute, K. Arya, and R. et al Babbush. 2019. Quantum Supremacy Using a Programmable Superconducting Processor. Nature 574 (oct 2019), 505--510."},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Magali Bardet Maxime Bros Daniel Cabarcas Philippe Gaborit Ray Perlner Daniel Smith-Tone Jean-Pierre Tillich and Javier Verbel. 2020. Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems. arXiv:cs.CR\/2002.08322  Magali Bardet Maxime Bros Daniel Cabarcas Philippe Gaborit Ray Perlner Daniel Smith-Tone Jean-Pierre Tillich and Javier Verbel. 2020. Improvements of Algebraic Attacks for solving the Rank Decoding and MinRank problems. arXiv:cs.CR\/2002.08322","DOI":"10.1007\/978-3-030-64837-4_17"},{"key":"e_1_2_1_10_1","unstructured":"Elaine Barker. 2020. Recommendation for Key Management: Part 1 - General. Special Publication 800-57 P.1 Rev.5.  Elaine Barker. 2020. Recommendation for Key Management: Part 1 - General. Special Publication 800-57 P.1 Rev.5."},{"key":"e_1_2_1_11_1","unstructured":"D.J. Bernstein C. Dobraunig M. Eichlseder S. Fluhrer S.L. Gazdag A. H\u00fclsing P. Kampanakis S. K\u00f6lbl T. Lange M.M. Lauridsen F. Mendel R. Niederhagen C. Rechberger J. Rijneveld and P. Schwabe. 2017. Sphincs+. https:\/\/sphincs.org\/data\/sphincs+-specification.pdf.  D.J. Bernstein C. Dobraunig M. Eichlseder S. Fluhrer S.L. Gazdag A. H\u00fclsing P. Kampanakis S. K\u00f6lbl T. Lange M.M. Lauridsen F. Mendel R. Niederhagen C. Rechberger J. Rijneveld and P. Schwabe. 2017. Sphincs+ . https:\/\/sphincs.org\/data\/sphincs+-specification.pdf."},{"key":"e_1_2_1_12_1","unstructured":"D. J. Bernstein and Tanja Lange. 2020. eBACS: ECRYPT Benchmarking of Cryptographic Systems. https:\/\/bench.cr.yp.to\/results-sign.html. Skylake (506e3)-sand.  D. J. Bernstein and Tanja Lange. 2020. eBACS: ECRYPT Benchmarking of Cryptographic Systems. https:\/\/bench.cr.yp.to\/results-sign.html. Skylake (506e3)-sand."},{"key":"e_1_2_1_13_1","unstructured":"W. Beullens B. Preneel A. Szepieniec and F. Vercauteren. 2019. LUOV; Signature Scheme proposal for NIST PQC Project.  W. Beullens B. Preneel A. Szepieniec and F. Vercauteren. 2019. LUOV; Signature Scheme proposal for NIST PQC Project."},{"key":"e_1_2_1_14_1","volume-title":"Transitioning to a Quantum-Resistant Public Key Infrastructure","author":"Bindel Nina","unstructured":"Nina Bindel , Udyani Herath , Matthew McKague , and Douglas Stebila . 2017. Transitioning to a Quantum-Resistant Public Key Infrastructure . In Post-Quantum Cryptography, Tanja Lange and Tsuyoshi Takagi (Eds.). Springer International Publishing , Cham , 384--405. Nina Bindel, Udyani Herath, Matthew McKague, and Douglas Stebila. 2017. Transitioning to a Quantum-Resistant Public Key Infrastructure. In Post-Quantum Cryptography, Tanja Lange and Tsuyoshi Takagi (Eds.). Springer International Publishing, Cham, 384--405."},{"key":"e_1_2_1_15_1","unstructured":"A. Casanova J.C. Faug\u00e8re G. Macario-Rat J. Patarin L. Perret and J. Ryckeghem. 2019. GeMSS: A Great Multivariate Short Signature. www-polsys.lip6.fr\/Links\/NIST\/GeMSS{_}specification{_}round2.pdf.  A. Casanova J.C. Faug\u00e8re G. Macario-Rat J. Patarin L. Perret and J. Ryckeghem. 2019. GeMSS: A Great Multivariate Short Signature. www-polsys.lip6.fr\/Links\/NIST\/GeMSS{_}specification{_}round2.pdf."},{"key":"e_1_2_1_16_1","unstructured":"A. Casanova J.C. Faug\u00e8re G. Macario-Rat J. Patarin L. Perret and J. Ryckeghem. 2020. GeMSS: A Great Multivariate Short Signature. https:\/\/www-polsys.lip6.fr\/Links\/NIST\/changes{_}round2{_}V2.pdf.  A. Casanova J.C. Faug\u00e8re G. Macario-Rat J. Patarin L. Perret and J. Ryckeghem. 2020. GeMSS: A Great Multivariate Short Signature. https:\/\/www-polsys.lip6.fr\/Links\/NIST\/changes{_}round2{_}V2.pdf."},{"key":"e_1_2_1_17_1","unstructured":"M. Chase D. Derler S. Goldfeder J. Katz V. Kolesnikov C. Orlandi S. Ramacher C. Rechberger D. Slamanig X. Wang and G. Zaverucha. 2019. The Picnic Signature Scheme Design Document v2.1. https:\/\/github.com\/microsoft\/Picnic\/blob\/master\/spec\/design-v2.1.pdf.  M. Chase D. Derler S. Goldfeder J. Katz V. Kolesnikov C. Orlandi S. Ramacher C. Rechberger D. Slamanig X. Wang and G. Zaverucha. 2019. The Picnic Signature Scheme Design Document v2.1. https:\/\/github.com\/microsoft\/Picnic\/blob\/master\/spec\/design-v2.1.pdf."},{"key":"e_1_2_1_18_1","volume-title":"Report on Post-Quantum Cryptography. US Department of Commerce","author":"Chen Lily","unstructured":"Lily Chen , Lily Chen , Stephen Jordan , Yi-Kai Liu , Dustin Moody , Rene Peralta , Ray Perlner , and Daniel Smith-Tone . 2016. Report on Post-Quantum Cryptography. US Department of Commerce , National Institute of Standards and Technology . Lily Chen, Lily Chen, Stephen Jordan, Yi-Kai Liu, Dustin Moody, Rene Peralta, Ray Perlner, and Daniel Smith-Tone. 2016. Report on Post-Quantum Cryptography. US Department of Commerce, National Institute of Standards and Technology."},{"key":"e_1_2_1_19_1","volume-title":"ECDSA: The missing piece of DNSSEC. https:\/\/www.cloudflare.com\/dns\/dnssec\/ecdsa-and-dnssec\/.","year":"2019","unstructured":"Cloudflare. 2019 . ECDSA: The missing piece of DNSSEC. https:\/\/www.cloudflare.com\/dns\/dnssec\/ecdsa-and-dnssec\/. Cloudflare. 2019. ECDSA: The missing piece of DNSSEC. https:\/\/www.cloudflare.com\/dns\/dnssec\/ecdsa-and-dnssec\/."},{"key":"e_1_2_1_20_1","volume-title":"NIST 2nd Post-Quantum Cryptography Standardization Conference","author":"Crockett Eric","year":"2019","unstructured":"Eric Crockett , Christian Paquin , and Douglas Stebila . 2019 . Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH . In NIST 2nd Post-Quantum Cryptography Standardization Conference 2019. Eric Crockett, Christian Paquin, and Douglas Stebila. 2019. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. In NIST 2nd Post-Quantum Cryptography Standardization Conference 2019."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6891"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365435"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7766"},{"key":"e_1_2_1_24_1","unstructured":"J. Ding M.S. Chen A. Petzoldt D. Schmidt and B.Y. Yang. [n. d.]. Rainbow. https:\/\/http:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-2\/submissions\/Rainbow-Round2.zip.  J. Ding M.S. Chen A. Petzoldt D. Schmidt and B.Y. Yang. [n. d.]. Rainbow. https:\/\/http:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-2\/submissions\/Rainbow-Round2.zip."},{"key":"e_1_2_1_25_1","unstructured":"J. Ding M.-S. Chen Albrecht Petzoldt and B.-Y. Schmidt Dieter Yang. 2017. Intellectual property statements Rainbow. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/ip-statements\/Rainbow-Statements.pdf.  J. Ding M.-S. Chen Albrecht Petzoldt and B.-Y. Schmidt Dieter Yang. 2017. Intellectual property statements Rainbow. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-1\/ip-statements\/Rainbow-Statements.pdf."},{"key":"e_1_2_1_26_1","first-page":"1490","article-title":"Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme","volume":"2019","author":"Ding Jintai","year":"2019","unstructured":"Jintai Ding , Joshua Deaton , Kurt Schmidt , Vishakha, and Zheng Zhang . 2019 . Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme . IACR Cryptol. ePrint Arch. 2019 (2019), 1490 . Jintai Ding, Joshua Deaton, Kurt Schmidt, Vishakha, and Zheng Zhang. 2019. Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme. IACR Cryptol. ePrint Arch. 2019 (2019), 1490.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_1_27_1","volume-title":"DNS flag day","year":"2020","unstructured":"DNS-Violations. 2020. DNS flag day 2020 . https:\/\/dnsflagday.net\/2020\/. DNS-Violations. 2020. DNS flag day 2020. https:\/\/dnsflagday.net\/2020\/."},{"key":"e_1_2_1_28_1","unstructured":"DNSCrypt. 2020. DNSCrypt: Frequently Asked Questions. https:\/\/dnscrypt.info\/faq.  DNSCrypt. 2020. DNSCrypt: Frequently Asked Questions. https:\/\/dnscrypt.info\/faq."},{"key":"e_1_2_1_29_1","unstructured":"L. Ducas E. Kiltz T. Lepoint V. Lyubashevsky P. Schwabe G. Seiler and D. Stehl\u00e9. 2019. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation. https:\/\/pq-crystals.org\/dilithium\/data\/dilithium-specification-round2.pdf.  L. Ducas E. Kiltz T. Lepoint V. Lyubashevsky P. Schwabe G. Seiler and D. Stehl\u00e9. 2019. CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation. https:\/\/pq-crystals.org\/dilithium\/data\/dilithium-specification-round2.pdf."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355566"},{"key":"e_1_2_1_31_1","unstructured":"P.-A. Fouque J. Hoffstein P. Kirchner V. Lyubashevsky T. Pornin T. Prest T. Ricosset G. Seiler W. Whyte and Z. Zhang. [n. d.]. Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU. https:\/\/falcon-sign.info\/falcon.pdf.  P.-A. Fouque J. Hoffstein P. Kirchner V. Lyubashevsky T. Pornin T. Prest T. Ricosset G. Seiler W. Whyte and Z. Zhang. [n. d.]. Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU. https:\/\/falcon-sign.info\/falcon.pdf."},{"key":"e_1_2_1_32_1","unstructured":"Craig Gidney and Martin Eker\u00e5. 2019. How to Factor 2048 bit RSA Integers in 8 Hours Using 20 Million Noisy Qubits. arXiv:1905.09749  Craig Gidney and Martin Eker\u00e5. 2019. How to Factor 2048 bit RSA Integers in 8 Hours Using 20 Million Noisy Qubits. arXiv:1905.09749"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7129"},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","unstructured":"L. Groot Bruinderink A. H\u00fclsing T. Lange and Y. Yarom. 2016. Flush Gauss and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. Springer Berlin Heidelberg 323--345.  L. Groot Bruinderink A. H\u00fclsing T. Lange and Y. Yarom. 2016. Flush Gauss and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. Springer Berlin Heidelberg 323--345.","DOI":"10.1007\/978-3-662-53140-2_16"},{"key":"e_1_2_1_35_1","volume-title":"2013 IEEE Conference on Communications and Network Security (CNS). 224--232","author":"Herzberg A.","unstructured":"A. Herzberg and H. Shulman . 2013. Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org . In 2013 IEEE Conference on Communications and Network Security (CNS). 224--232 . A. Herzberg and H. Shulman. 2013. Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. In 2013 IEEE Conference on Communications and Network Security (CNS). 224--232."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6698"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC6605"},{"key":"e_1_2_1_39_1","volume-title":"Silverman","author":"Hoffstein Jeffrey","year":"1998","unstructured":"Jeffrey Hoffstein , Jill Pipher , and Joseph H . Silverman . 1998 . NTRU : A Ring-Based Public Key Cryptosystem. In Lecture Notes in Computer Science. Springer-Verlag , 267--288. Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. 1998. NTRU: A Ring-Based Public Key Cryptosystem. In Lecture Notes in Computer Science. Springer-Verlag, 267--288."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7858"},{"key":"e_1_2_1_41_1","unstructured":"Huston Geoff. 2019. The State of DNSSEC Validation. https:\/\/blog.apnic.net\/2019\/03\/14\/the-state-of-dnssec-validation\/.  Huston Geoff. 2019. The State of DNSSEC Validation. https:\/\/blog.apnic.net\/2019\/03\/14\/the-state-of-dnssec-validation\/."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5702"},{"key":"e_1_2_1_43_1","unstructured":"D. Kales and G. Zaverucha. 2019. Forgery Attacks on MQDSSv2.0. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-2\/official-comments\/MQDSS-round2-official-comment.pdf.  D. Kales and G. Zaverucha. 2019. Forgery Attacks on MQDSSv2.0. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-2\/official-comments\/MQDSS-round2-official-comment.pdf."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5155"},{"key":"e_1_2_1_46_1","volume-title":"Measurement Code: Custom Performance Test. https:\/\/github.com\/SIDN\/pqc-dnssec-measurement.","author":"M\u00fcller Moritz","year":"2020","unstructured":"Moritz M\u00fcller , Jins de Jong , Maran van Heesch , Benno Overeinder , and Roland van Rijswijk Deij . 2020 . Measurement Code: Custom Performance Test. https:\/\/github.com\/SIDN\/pqc-dnssec-measurement. Moritz M\u00fcller, Jins de Jong, Maran van Heesch, Benno Overeinder, and Roland van Rijswijk Deij. 2020. Measurement Code: Custom Performance Test. https:\/\/github.com\/SIDN\/pqc-dnssec-measurement."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355570"},{"key":"e_1_2_1_48_1","unstructured":"NLnet Labs. 2020. DNSThought Live Measurements. https:\/\/dnsthought.nlnetlabs.nl\/.  NLnet Labs. 2020. DNSThought Live Measurements. https:\/\/dnsthought.nlnetlabs.nl\/."},{"key":"e_1_2_1_49_1","unstructured":"D. Ott C. Peikert and other workshop participants. 2019. Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility. arXiv:1909.07353  D. Ott C. Peikert and other workshop participants. 2019. Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility. arXiv:1909.07353"},{"key":"e_1_2_1_50_1","volume-title":"Dagstuhl Workshop on Cryptography (Sep","author":"Patarin J.","year":"1997","unstructured":"J. Patarin . 1997 . The Oil and Vinegar Signature Scheme. https:\/\/ci.nii.ac.jp\/naid\/10028073837\/en\/ . Dagstuhl Workshop on Cryptography (Sep 1997). J. Patarin. 1997. The Oil and Vinegar Signature Scheme. https:\/\/ci.nii.ac.jp\/naid\/10028073837\/en\/. Dagstuhl Workshop on Cryptography (Sep 1997)."},{"key":"e_1_2_1_52_1","unstructured":"Rod Rasmussen. 2019. SSAC Comment to NIST on Quantum Cryptography Algorithms. https:\/\/www.icann.org\/en\/system\/files\/files\/sac-107-en.pdf.  Rod Rasmussen. 2019. SSAC Comment to NIST on Quantum Cryptography Algorithms. https:\/\/www.icann.org\/en\/system\/files\/files\/sac-107-en.pdf."},{"key":"e_1_2_1_53_1","unstructured":"P. Ravi M. Prasad Jhanwar J. Howe A. Chattopadhyay and S. Bhasin. 2018. Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate. Cryptology ePrint Archive Report 2018\/821. https:\/\/eprint.iacr.org\/2018\/821.  P. Ravi M. Prasad Jhanwar J. Howe A. Chattopadhyay and S. Bhasin. 2018. Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate. Cryptology ePrint Archive Report 2018\/821. https:\/\/eprint.iacr.org\/2018\/821."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58691-1_68"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8080"},{"key":"e_1_2_1_56_1","unstructured":"Rainbow team. 2020. Modified Parameters of Rainbow in Response to a Refined Analysis of the Rainbow Band Separation Attack by the NIST Team and the Recent New MinRank attacks. https:\/\/sites.google.com\/site\/jintaiding\/nist-papers.  Rainbow team. 2020. Modified Parameters of Rainbow in Response to a Refined Analysis of the Rainbow Band Separation Attack by the NIST Team and the Recent New MinRank attacks. https:\/\/sites.google.com\/site\/jintaiding\/nist-papers."},{"key":"e_1_2_1_57_1","unstructured":"Willem Toorop Moritz M\u00fcller and Taejoong Chung. 2019. Measuring the impact of DNS Flag Day. https:\/\/blog.apnic.net\/2019\/08\/19\/measuring-the-impact-of-dns-flag-day\/.  Willem Toorop Moritz M\u00fcller and Taejoong Chung. 2019. Measuring the impact of DNS Flag Day. https:\/\/blog.apnic.net\/2019\/08\/19\/measuring-the-impact-of-dns-flag-day\/."},{"key":"e_1_2_1_58_1","unstructured":"National Institute of Standards US Department of Commerce and Technology (NIST). 2016. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/call-for-proposals-final-dec-2016.pdf.  National Institute of Standards US Department of Commerce and Technology (NIST). 2016. Submission Requirements and Evaluation Criteria for the Post-Quantum Cryptography Standardization Process. https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/call-for-proposals-final-dec-2016.pdf."},{"key":"e_1_2_1_59_1","unstructured":"National Institute of Standards US Department of Commerce and Technology (NIST). 2020. Post-Quantum Cryptography: Round 2 Submissions. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions.  National Institute of Standards US Department of Commerce and Technology (NIST). 2020. Post-Quantum Cryptography: Round 2 Submissions. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-2-submissions."},{"key":"e_1_2_1_60_1","volume-title":"DNSSEC meets real world: dealing with unreachability caused by fragmentation","author":"Den Broek Gijs Van","year":"2014","unstructured":"Gijs Van Den Broek , Roland van Rijswijk-Deij , Anna Sperotto , and Aiko Pras . 2014. DNSSEC meets real world: dealing with unreachability caused by fragmentation . IEEE communications magazine 52, 4 ( 2014 ), 154--160. Gijs Van Den Broek, Roland van Rijswijk-Deij, Anna Sperotto, and Aiko Pras. 2014. DNSSEC meets real world: dealing with unreachability caused by fragmentation. IEEE communications magazine 52, 4 (2014), 154--160."},{"key":"e_1_2_1_61_1","unstructured":"M. van Heesch N. van Adrichem T. Attema and T. Veugen. 2019. Towards Quantum-Safe VPNs and Internet. Cryptology ePrint Archive Report 2019\/1277. (2019). https:\/\/eprint.iacr.org\/2019\/1277.  M. van Heesch N. van Adrichem T. Attema and T. Veugen. 2019. Towards Quantum-Safe VPNs and Internet. Cryptology ePrint Archive Report 2019\/1277. (2019). https:\/\/eprint.iacr.org\/2019\/1277."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2605767"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2558918"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663731"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831350"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8624"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3431832.3431838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3431832.3431838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:46Z","timestamp":1750195486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3431832.3431838"}},"subtitle":["a case study of DNSSEC"],"short-title":[],"issued":{"date-parts":[[2020,10,26]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10,26]]}},"alternative-id":["10.1145\/3431832.3431838"],"URL":"https:\/\/doi.org\/10.1145\/3431832.3431838","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2020,10,26]]},"assertion":[{"value":"2020-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}