{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T09:50:47Z","timestamp":1769161847162,"version":"3.49.0"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T00:00:00Z","timestamp":1619740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Queue"],"published-print":{"date-parts":[[2021,4,30]]},"abstract":"<jats:p>There is a new technology on the horizon that will forever change the information security and privacy industry landscape. Quantum computing, together with quantum communication, will have many beneficial applications but will also be capable of breaking many of today's most popular cryptographic techniques that help ensure data protection?in particular, confidentiality and integrity of sensitive information. These techniques are ubiquitously embedded in today's digital fabric and implemented by many industries such as finance, health care, utilities, and the broader information communication technology (ICT) community. It is therefore imperative for ICT executives to prepare for the transition from quantum-vulnerable to quantum-resistant technologies.<\/jats:p>","DOI":"10.1145\/3466132.3466779","type":"journal-article","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T14:50:11Z","timestamp":1621349411000},"page":"65-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["The Complex Path to Quantum Resistance"],"prefix":"10.1145","volume":"19","author":[{"given":"Atefeh","family":"Mashatan","sequence":"first","affiliation":[{"name":"Ryerson University"}]},{"given":"Douglas","family":"Heintzman","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2021,5,18]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Implementation security of quantum cryptography: introduction, challenges, solutions. ETSI White Paper No. 27","author":"All\u00e9aume R.","unstructured":"All\u00e9aume, R., et al. 2018. Implementation security of quantum cryptography: introduction, challenges, solutions. ETSI White Paper No. 27. European Telecommunications Standards Institute; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/etsi_wp27_qkd_imp_sec_FINAL.pdf."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.CSWP.05262020-draft"},{"key":"e_1_2_1_3_1","article-title":"Hybrid quantum-classical approach to correlated materials","author":"Bauer B.","year":"2016","unstructured":"Bauer, B., Wecker, D., Millis, A., Hastings, B., Troyer, M. 2016. Hybrid quantum-classical approach to correlated materials. Physical Review X 6(3); https:\/\/journals.aps.org\/prx\/pdf\/10.1103\/PhysRevX.6.031045.","journal-title":"Physical Review"},{"key":"e_1_2_1_4_1","volume-title":"Introduction to post-quantum cryptography","author":"Bernstein D. J.","unstructured":"Bernstein, D. J. 2009. Introduction to post-quantum cryptography. In Post-Quantum Cryptography, eds. D.J. Bernstein, J. Buchmann, and E. Dahmen, 1-14. Springer."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of PQCrypto 2017 eds. T. Lange and T. Takagi, 384-405","author":"Bindel N.","year":"2017","unstructured":"Bindel, N., Herath, U., McKague, M., Stebila, D. 2017. Transitioning to a quantum-resistant public-key infrastructure. In Post-Quantum Cryptography, Proceedings of PQCrypto 2017 eds. T. Lange and T. Takagi, 384-405. Springer; https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-59879-6_22."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1521-3978(199806)46:4\/5<493::AID-PROP493>3.0.CO;2-P"},{"key":"e_1_2_1_7_1","volume-title":"Experimenting with post-quantum cryptography. Google Security Blog","author":"Braithwaite M.","year":"2016","unstructured":"Braithwaite, M. 2016. Experimenting with post-quantum cryptography. Google Security Blog; https:\/\/security.googleblog.com\/2016\/07\/experimenting-with-post-quantum.html."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761714"},{"key":"e_1_2_1_9_1","unstructured":"Campagna M. Chen L. Dagdelen \u00d6. Ding J. Fernick J. K. Gisin N. Hayford D. Jennewein T. L\u00fctkenhaus N. Mosca M. et al. 2018. Quantum-safe cryptography and security. ETSI White Paper No. 8; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/QuantumSafeWhitepaper.pdf."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"e_1_2_1_11_1","unstructured":"D-Wave. Processing with D-Wave; https:\/\/www.dwavesys.com\/ ."},{"key":"e_1_2_1_12_1","unstructured":"European Telecommunications Standards Institute (ETSI). 2015. Quantum-safe cryptography and security; https:\/\/www.etsi.org\/images\/files\/ETSIWhitePapers\/QuantumSafeWhitepaper.pdf."},{"key":"e_1_2_1_13_1","volume-title":"Top 25 technology predictions","author":"Evans D.","unstructured":"Evans, D. 2009. Top 25 technology predictions. CISCO Internet Business Solutions Group; https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/Top_25_Predictions_121409rev.pdf."},{"key":"e_1_2_1_14_1","unstructured":"evolutionQ; https:\/\/evolutionq.com\/news.html."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Grassl M. Langenberg B. Roetteler M. Steinwandt R. 2015. Applying Grover's algorithm to AES: quantum resource estimates. arXiv preprint arXiv:1512.04965; https:\/\/arxiv.org\/abs\/1512.04965.","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_2_1_17_1","unstructured":"Isara. Isara's quantum-safe readiness program for enterprise. Isara; https:\/\/www.isara.com\/services\/quantum-readiness-enterprise.html."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2015.02.006"},{"key":"e_1_2_1_19_1","unstructured":"Mashatan A. Turetken O. 2020. Preparing for the information security threat from quantum computers. MIS Quarterly Executive 19(2); https:\/\/aisel.aisnet.org\/misqe\/vol19\/iss2\/7."},{"key":"e_1_2_1_20_1","unstructured":"McEliece R. 1978. A public-key cryptosystem based on algebraic coding theory. DSN (Deep Space Network) Progress Report 42-44; https:\/\/tmo.jpl.nasa.gov\/progress_report2\/42-44\/44N.PDF."},{"key":"e_1_2_1_21_1","unstructured":"Microsoft. 2016. Lattice cryptography library. Microsoft; https:\/\/www.microsoft.com\/en-us\/research\/project\/lattice-cryptography-library\/."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"key":"e_1_2_1_23_1","unstructured":"National Institute of Standards and Technology. 2020. Post-quantum cryptography round 3 finalists: public-key encryption and key-establishment algorithms. NIST; https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/round-3-submissions."},{"key":"e_1_2_1_24_1","unstructured":"O'Connor L. Dukatz C. DiValentin L. Farhady N. 2018. Cryptography in a post-quantum world: preparing intelligent enterprises now for a secure future. Accenture Labs; https:\/\/www.accenture.com\/_acnmedia\/pdf-87\/accenture-809668-quantum-cryptography-whitepaper-v05.pdf."},{"issue":"12","key":"e_1_2_1_25_1","first-page":"16","article-title":"Quantum leap","volume":"26","author":"Olenick D.","year":"2015","unstructured":"Olenick, D. 2015. Quantum leap? SC Magazine 26(12), 16-17; https:\/\/www.scmagazine.com\/home\/security-news\/quantum-leap-the-impact-of-quantum-computing-on-encryption\/.","journal-title":"SC Magazine"},{"key":"e_1_2_1_26_1","unstructured":"Phillips T. The mathematics behind quantum computing. https:\/\/www.math.stonybrook.edu\/~tony\/whatsnew\/may07\/quantumI.html"},{"key":"e_1_2_1_27_1","volume-title":"2019 data breaches: 4 billion records breached so far","author":"Rafter D.","year":"2019","unstructured":"Rafter, D. 2019. 2019 data breaches: 4 billion records breached so far. Norton; https:\/\/us.norton.com\/internetsecurity-emerging-threats-2019-data-breaches.html."},{"key":"e_1_2_1_28_1","unstructured":"Roetteler M. Naehrig M. Svore K. M. Lauter K. 2017. Quantum resource estimates for computing elliptic curve discrete logarithms. arXiv 1706.06752; https:\/\/arxiv.org\/abs\/1706.06752."},{"key":"e_1_2_1_29_1","unstructured":"Schanck J. Whyte W. Zhang Z. 2016. Criteria for selection of public-key cryptographic algorithms for quantum-safe hybrid cryptography. Internet draft. IETF; https:\/\/tools.ietf.org\/html\/draft-whyte-select-pkc-qsh-02."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_2_1_31_1","unstructured":"Simonite T. 2015. Google says it has proved its controversial quantum computer really works. MIT Technology Review; https:\/\/www.technologyreview.com\/s\/544276\/google-says-it-has-proved-its-controversial-quantum-computer-really-works\/."},{"key":"e_1_2_1_32_1","unstructured":"Soukharev V. 2020. InfoSec Global's roadmap to migrate to NIST's new standards. InfoSec Global; https:\/\/www.infosecglobal.com\/post\/infosec-globals-roadmap-to-migrate-to-nists-new-standards."},{"key":"e_1_2_1_33_1","volume-title":"Top five questions about using quantum-safe security in financial transactions. FinTech Futures","author":"Totzke S.","year":"2017","unstructured":"Totzke, S. 2017. Top five questions about using quantum-safe security in financial transactions. FinTech Futures; https:\/\/www.fintechfutures.com\/2017\/07\/top-five-questions-about-using-quantum-safe-security-in-financial-transactions."},{"key":"e_1_2_1_34_1","volume-title":"Cyber security in the quantum era. Communications of the ACM 62(4), 120","author":"Wallden P.","year":"2019","unstructured":"Wallden, P., Kashefi, E. 2019. Cyber security in the quantum era. Communications of the ACM 62(4), 120; https:\/\/cacm.acm.org\/magazines\/2019\/4\/235578-cyber-security-in-the-quantum-era\/fulltext."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7722-9_5"}],"container-title":["Queue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466132.3466779","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3466132.3466779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:18Z","timestamp":1750191498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3466132.3466779"}},"subtitle":["Is your organization prepared?"],"short-title":[],"issued":{"date-parts":[[2021,4,30]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,4,30]]}},"alternative-id":["10.1145\/3466132.3466779"],"URL":"https:\/\/doi.org\/10.1145\/3466132.3466779","relation":{},"ISSN":["1542-7730","1542-7749"],"issn-type":[{"value":"1542-7730","type":"print"},{"value":"1542-7749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,30]]},"assertion":[{"value":"2021-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}