{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:11Z","timestamp":1750220351091,"version":"3.41.0"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T00:00:00Z","timestamp":1629763200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["EGP 543598 ? 19, PI: Atefeh Mashatan"],"award-info":[{"award-number":["EGP 543598 ? 19, PI: Atefeh Mashatan"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2021,9]]},"abstract":"<jats:p>Is your organization prepared?<\/jats:p>","DOI":"10.1145\/3464905","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T14:28:46Z","timestamp":1629815326000},"page":"46-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["The complex path to quantum resistance"],"prefix":"10.1145","volume":"64","author":[{"given":"Atefeh","family":"Mashatan","sequence":"first","affiliation":[{"name":"Ryerson University"}]},{"given":"Douglas","family":"Heintzman","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2021,8,24]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Implementation security of quantum cryptography: introduction, challenges, solutions. ETSI White Paper No. 27","author":"All\u00e9aume R.","year":"2018","unstructured":"All\u00e9aume , R. , Implementation security of quantum cryptography: introduction, challenges, solutions. ETSI White Paper No. 27 . European Telecommunications Standards Institute , 2018 ; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/etsi_wp27_qkd_imp_sec_FINAL.pdf. All\u00e9aume, R., et al. Implementation security of quantum cryptography: introduction, challenges, solutions. ETSI White Paper No. 27. European Telecommunications Standards Institute, 2018; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/etsi_wp27_qkd_imp_sec_FINAL.pdf."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.CSWP.05262020-draft"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.6.031045"},{"volume-title":"Proceedings of the 2009 Post-Quantum Cryptography. D.J. Bernstein, J. Buchmann, and E. Dahmen, Eds. Springer 1--14","author":"Bernstein D.J.","key":"e_1_2_1_4_1","unstructured":"Bernstein , D.J. Introduction to post-quantum cryptography . In Proceedings of the 2009 Post-Quantum Cryptography. D.J. Bernstein, J. Buchmann, and E. Dahmen, Eds. Springer 1--14 . Bernstein, D.J. Introduction to post-quantum cryptography. In Proceedings of the 2009 Post-Quantum Cryptography. D.J. Bernstein, J. Buchmann, and E. Dahmen, Eds. Springer 1--14."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59879-6_22"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1521-3978(199806)46:4\/5<493::AID-PROP493>3.0.CO;2-P"},{"key":"e_1_2_1_7_1","volume-title":"Experimenting with post-quantum cryptography. Google Security Blog","author":"Braithwaite M.","year":"2016","unstructured":"Braithwaite , M. 2016. Experimenting with post-quantum cryptography. Google Security Blog ; https:\/\/security.googleblog.com\/ 2016 \/07\/experimenting-with-post-quantum.html. Braithwaite, M. 2016. Experimenting with post-quantum cryptography. Google Security Blog; https:\/\/security.googleblog.com\/2016\/07\/experimenting-with-post-quantum.html."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761714"},{"key":"e_1_2_1_9_1","volume-title":"et al. Quantum-safe cryptography and security. ETSI White Paper No. 8","author":"Campagna M.","year":"2018","unstructured":"Campagna , M. et al. Quantum-safe cryptography and security. ETSI White Paper No. 8 , 2018 ; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/QuantumSafeWhitepaper.pdf. Campagna, M. et al. Quantum-safe cryptography and security. ETSI White Paper No. 8, 2018; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/QuantumSafeWhitepaper.pdf."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"e_1_2_1_11_1","unstructured":"D-Wave. Processing with D-Wave; https:\/\/www.dwavesys.com\/.  D-Wave. Processing with D-Wave; https:\/\/www.dwavesys.com\/."},{"key":"e_1_2_1_12_1","volume-title":"Quantum-safe cryptography and security","author":"European Telecommunications Standards Institute","year":"2015","unstructured":"European Telecommunications Standards Institute . Quantum-safe cryptography and security , 2015 ; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/QuantumSafeWhitepaper.pdf. European Telecommunications Standards Institute. Quantum-safe cryptography and security, 2015; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/QuantumSafeWhitepaper.pdf."},{"key":"e_1_2_1_13_1","volume-title":"Top 25 technology predictions","author":"Evans D.","year":"2009","unstructured":"Evans , D. Top 25 technology predictions . CISCO Internet Business Solutions Group , 2009 ; https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/Top_25_Predictions_121409rev.pdf. Evans, D. Top 25 technology predictions. CISCO Internet Business Solutions Group, 2009; https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/Top_25_Predictions_121409rev.pdf."},{"key":"e_1_2_1_14_1","unstructured":"evolutionQ; https:\/\/evolutionq.com\/news.html.  evolutionQ; https:\/\/evolutionq.com\/news.html."},{"key":"e_1_2_1_15_1","volume-title":"Applying Grover's algorithm to AES: quantum resource estimates","author":"Grassl M.","year":"2015","unstructured":"Grassl , M. , Langenberg , B. , Roetteler , M. , Steinwandt , R. Applying Grover's algorithm to AES: quantum resource estimates , 2015 ; https:\/\/arxiv.org\/abs\/1512.04965. Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R. Applying Grover's algorithm to AES: quantum resource estimates, 2015; https:\/\/arxiv.org\/abs\/1512.04965."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_2_1_17_1","unstructured":"Isara. Isara's quantum-safe readiness program for enterprise; https:\/\/www.isara.com\/services\/quantum-readiness-enterprise.html.  Isara. Isara's quantum-safe readiness program for enterprise; https:\/\/www.isara.com\/services\/quantum-readiness-enterprise.html."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2015.02.006"},{"key":"e_1_2_1_19_1","first-page":"2","article-title":"Preparing for the information security threat from quantum computers","volume":"19","author":"Mashatan A.","year":"2020","unstructured":"Mashatan , A. , Turetken , O . Preparing for the information security threat from quantum computers . MIS Q. Executive 19 , 2 ( 2020 ); https:\/\/aisel.aisnet.org\/misqe\/vol19\/iss2\/7. Mashatan, A., Turetken, O. Preparing for the information security threat from quantum computers. MIS Q. Executive 19, 2 (2020); https:\/\/aisel.aisnet.org\/misqe\/vol19\/iss2\/7.","journal-title":"MIS Q. Executive"},{"key":"e_1_2_1_20_1","volume-title":"DSN (Deep Space Network) Progress Report","author":"McEliece R.","year":"1978","unstructured":"McEliece , R. A public-key cryptosystem based on algebraic coding theory . DSN (Deep Space Network) Progress Report , 1978 , 42--44; https:\/\/tmo.jpl.nasa.gov\/progress_report2\/42-44\/44N.PDF. McEliece, R. A public-key cryptosystem based on algebraic coding theory. DSN (Deep Space Network) Progress Report, 1978, 42--44; https:\/\/tmo.jpl.nasa.gov\/progress_report2\/42-44\/44N.PDF."},{"key":"e_1_2_1_21_1","volume-title":"Lattice cryptography library. Microsoft","author":"Microsoft","year":"2016","unstructured":"Microsoft . Lattice cryptography library. Microsoft , 2016 ; https:\/\/www.microsoft.com\/en-us\/research\/project\/lattice-cryptography-library\/. Microsoft. Lattice cryptography library. Microsoft, 2016; https:\/\/www.microsoft.com\/en-us\/research\/project\/lattice-cryptography-library\/."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"volume-title":"NIST","author":"National Institute of Standards and Technology.","key":"e_1_2_1_23_1","unstructured":"National Institute of Standards and Technology. Post-quantum cryptography round 3 finalists: public-key encryption and key-establishment algorithms . NIST , 2020; https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-3-submissions. National Institute of Standards and Technology. Post-quantum cryptography round 3 finalists: public-key encryption and key-establishment algorithms. NIST, 2020; https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-3-submissions."},{"key":"e_1_2_1_24_1","volume-title":"Cryptography in a post-quantum world: Preparing intelligent enterprises now for a secure future. Accenture Labs","author":"O'Connor L.","year":"2018","unstructured":"O'Connor , L. , Dukatz , C. , DiValentin , L. , Farhady , N. Cryptography in a post-quantum world: Preparing intelligent enterprises now for a secure future. Accenture Labs , 2018 ; https:\/\/www.accenture.com\/_acnmedia\/pdf-87\/accenture-809668-quantum-cryptography-whitepaper-v05.pdf. O'Connor, L., Dukatz, C., DiValentin, L., Farhady, N. Cryptography in a post-quantum world: Preparing intelligent enterprises now for a secure future. Accenture Labs, 2018; https:\/\/www.accenture.com\/_acnmedia\/pdf-87\/accenture-809668-quantum-cryptography-whitepaper-v05.pdf."},{"key":"e_1_2_1_25_1","first-page":"12","volume":"26","author":"Olenick D.","year":"2015","unstructured":"Olenick , D. Quantum leap ? SC Magazine 26 , 12 ( 2015 ), 16--17; https:\/\/www.scmagazine.com\/home\/security-news\/quantum-leap-the-impact-of-quantum-computing-on-encryption\/. Olenick, D. Quantum leap? SC Magazine 26, 12 (2015), 16--17; https:\/\/www.scmagazine.com\/home\/security-news\/quantum-leap-the-impact-of-quantum-computing-on-encryption\/.","journal-title":"SC Magazine"},{"key":"e_1_2_1_26_1","unstructured":"Phillips T. The mathematics behind quantum computing. https:\/\/www.math.stonybrook.edu\/~tony\/whatsnew\/may07\/quantumI.html  Phillips T. The mathematics behind quantum computing. https:\/\/www.math.stonybrook.edu\/~tony\/whatsnew\/may07\/quantumI.html"},{"key":"e_1_2_1_27_1","volume-title":"2019 data breaches: 4 billion records breached so far","author":"Rafter D.","year":"2019","unstructured":"Rafter , D. 2019 data breaches: 4 billion records breached so far . Norton ; https:\/\/us.norton.com\/internetsecurity-emerging-threats- 2019 -data-breaches.html. Rafter, D. 2019 data breaches: 4 billion records breached so far. Norton; https:\/\/us.norton.com\/internetsecurity-emerging-threats-2019-data-breaches.html."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_9"},{"key":"e_1_2_1_29_1","volume-title":"Criteria for selection of public-key cryptographic algorithms for quantum-safe hybrid cryptography. Internet draft. IETF","author":"Schanck J.","year":"2016","unstructured":"Schanck , J. , Whyte , W. , Zhang , Z. Criteria for selection of public-key cryptographic algorithms for quantum-safe hybrid cryptography. Internet draft. IETF , 2016 ; https:\/\/tools.ietf.org\/html\/draft-whyte-select-pkc-qsh-02. Schanck, J., Whyte, W., Zhang, Z. Criteria for selection of public-key cryptographic algorithms for quantum-safe hybrid cryptography. Internet draft. IETF, 2016; https:\/\/tools.ietf.org\/html\/draft-whyte-select-pkc-qsh-02."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_2_1_31_1","volume-title":"Google says it has proved its controversial quantum computer really works. MIT Technology Rev","author":"Simonite T.","year":"2015","unstructured":"Simonite , T. Google says it has proved its controversial quantum computer really works. MIT Technology Rev ., 2015 ; https:\/\/www.technologyreview.com\/s\/544276\/google-says-it-has-proved-its-controversial-quantum-computer-really-works\/. Simonite, T. Google says it has proved its controversial quantum computer really works. MIT Technology Rev., 2015; https:\/\/www.technologyreview.com\/s\/544276\/google-says-it-has-proved-its-controversial-quantum-computer-really-works\/."},{"key":"e_1_2_1_32_1","volume-title":"InfoSec Global's roadmap to migrate to NIST's new standards. InfoSec Global","author":"Soukharev V.","year":"2020","unstructured":"Soukharev , V. InfoSec Global's roadmap to migrate to NIST's new standards. InfoSec Global , 2020 ; https:\/\/www.infosecglobal.com\/post\/infosec-globals-roadmap-to-migrate-to-nists-new-standards. Soukharev, V. InfoSec Global's roadmap to migrate to NIST's new standards. InfoSec Global, 2020; https:\/\/www.infosecglobal.com\/post\/infosec-globals-roadmap-to-migrate-to-nists-new-standards."},{"key":"e_1_2_1_33_1","volume-title":"Top five questions about using quantum-safe security in financial transactions. FinTech Futures","author":"Totzke S.","year":"2017","unstructured":"Totzke , S. Top five questions about using quantum-safe security in financial transactions. FinTech Futures , 2017 ; https:\/\/www.fintechfutures.com\/2017\/07\/top-five-questions-about-using-quantum-safe-security-in-financial-transactions. Totzke, S. Top five questions about using quantum-safe security in financial transactions. FinTech Futures, 2017; https:\/\/www.fintechfutures.com\/2017\/07\/top-five-questions-about-using-quantum-safe-security-in-financial-transactions."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241037"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7722-9_5"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464905","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3464905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:11Z","timestamp":1750191431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464905"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,24]]},"references-count":35,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["10.1145\/3464905"],"URL":"https:\/\/doi.org\/10.1145\/3464905","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2021,8,24]]},"assertion":[{"value":"2021-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}