{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:18:27Z","timestamp":1775326707789,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Einstein Research Unit of the Berlin University Alliance"},{"name":"German Federal Ministry of Education and Research (BMBF)","award":["16KISK030, 16KIS1074"],"award-info":[{"award-number":["16KISK030, 16KIS1074"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528540","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"157-168","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["A Post-Quantum Secure Subscription Concealed Identifier for 6G"],"prefix":"10.1145","author":[{"given":"Vincent Quentin","family":"Ulitzsch","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Shinjo","family":"Park","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Soundes","family":"Marzougui","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Berlin, Germany"}]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin, Fraunhofer Institute for Secure Information Technology, Berlin, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"915","article-title":"Release description; Release 15","volume":"21","author":"GPP.","year":"2019","unstructured":"3 GPP. 2019 . Release description; Release 15 . Technical Report (TR) 21 . 915 . 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/DynaReport\/21915. htm Version 15.0.0. 3GPP. 2019. Release description; Release 15. Technical Report (TR) 21.915. 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/DynaReport\/21915. htm Version 15.0.0.","journal-title":"Technical Report (TR)"},{"key":"e_1_3_2_1_2_1","first-page":"102","article-title":"3G security; Security architecture","volume":"33","author":"GPP.","year":"2020","unstructured":"3 GPP. 2020 . 3G security; Security architecture . Technical Specification (TS) 33 . 102 . 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/DynaReport\/ 33102.htm Version 16.0.0. 3GPP. 2020. 3G security; Security architecture. Technical Specification (TS) 33.102. 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/DynaReport\/ 33102.htm Version 16.0.0.","journal-title":"Technical Specification (TS)"},{"key":"e_1_3_2_1_3_1","first-page":"206","article-title":"3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification","volume":"35","author":"GPP.","year":"2020","unstructured":"3 GPP. 2020 . 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification . Technical Specification (TS) 35 . 206 . 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/ DynaReport\/35206.htm Version 16.0.0. 3GPP. 2020. 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification. Technical Specification (TS) 35.206. 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/ DynaReport\/35206.htm Version 16.0.0.","journal-title":"Technical Specification (TS)"},{"key":"e_1_3_2_1_4_1","volume-title":"3rd Generation Partnership Project","author":"Numbering GPP.","unstructured":"3 GPP. 2021. Numbering , addressing and identification. TS 23.003 . 3rd Generation Partnership Project . http:\/\/www.3gpp.org\/dynareport\/23003.htm Version 17.4.0. 3GPP. 2021. Numbering, addressing and identification. TS 23.003. 3rd Generation Partnership Project. http:\/\/www.3gpp.org\/dynareport\/23003.htm Version 17.4.0."},{"key":"e_1_3_2_1_5_1","first-page":"501","article-title":"System architecture for the 5G System (5GS)","volume":"23","author":"GPP.","year":"2021","unstructured":"3 GPP. 2021 . System architecture for the 5G System (5GS) . Technical Specification (TS) 23 . 501 . 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/ DynaReport\/23501.htm Version 17.3.0. 3GPP. 2021. System architecture for the 5G System (5GS). Technical Specification (TS) 23.501. 3rd Generation Partnership Project (3GPP). http:\/\/www.3gpp.org\/ DynaReport\/23501.htm Version 17.3.0.","journal-title":"Technical Specification (TS)"},{"key":"e_1_3_2_1_6_1","first-page":"501","article-title":"Security architecture and procedures for 5G System","volume":"33","author":"GPP.","year":"2022","unstructured":"3 GPP. 2022 . Security architecture and procedures for 5G System . Technical Specification (TS) 33 . 501 . 3rd Generation Partnership Project (3GPP). http: \/\/www.3gpp.org\/DynaReport\/33501.htm Version 17.4.2. 3GPP. 2022. Security architecture and procedures for 5G System. Technical Specification (TS) 33.501. 3rd Generation Partnership Project (3GPP). http: \/\/www.3gpp.org\/DynaReport\/33501.htm Version 17.4.2.","journal-title":"Technical Specification (TS)"},{"key":"e_1_3_2_1_7_1","volume-title":"International workshop on cryptographic hardware and embedded systems. Springer, 29--45","author":"Agrawal Dakshi","year":"2002","unstructured":"Dakshi Agrawal , Bruce Archambeault , Josyula R Rao , and Pankaj Rohatgi . 2002 . The EM side-channel (s) . In International workshop on cryptographic hardware and embedded systems. Springer, 29--45 . Dakshi Agrawal, Bruce Archambeault, Josyula R Rao, and Pankaj Rohatgi. 2002. The EM side-channel (s). In International workshop on cryptographic hardware and embedded systems. Springer, 29--45."},{"key":"e_1_3_2_1_8_1","volume-title":"Martin Tomlinson, and Wen Wang.","author":"Albrecht Martin R.","year":"2020","unstructured":"Martin R. Albrecht , Daniel J. Bernstein , Tung Chou , Carlos Cid , Jan Gilcher , Tanja Lange , Varun Maram , Ingo von Maurich , Rafael Misoczki , Ruben Niederhagen , Kenneth G. Paterson , Edoardo Persichetti , Christiane Peters , Peter Schwabe , Nicolas Sendrier , Jakub Szefer , Cen Jung Tjhai , Martin Tomlinson, and Wen Wang. 2020 . Classic McEliece. Technical Report. National Institute of Standards and Technology . available at https:\/\/csrc.nist.gov\/projects\/post-quantumcryptography\/round-3-submissions. Martin R. Albrecht, Daniel J. Bernstein, Tung Chou, Carlos Cid, Jan Gilcher, Tanja Lange, Varun Maram, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Kenneth G. Paterson, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, Jakub Szefer, Cen Jung Tjhai, Martin Tomlinson, and Wen Wang. 2020. Classic McEliece. Technical Report. National Institute of Standards and Technology. available at https:\/\/csrc.nist.gov\/projects\/post-quantumcryptography\/round-3-submissions."},{"key":"e_1_3_2_1_9_1","volume-title":"63: Public Key Cryptography for the Financial Services Industry, Key Agreement and Key Transport Using Elliptic Curve Cryptography","author":"ANSI.","year":"1998","unstructured":"X9 ANSI. 1998. 63: Public Key Cryptography for the Financial Services Industry, Key Agreement and Key Transport Using Elliptic Curve Cryptography . American National Standards Institute ( 1998 ). X9 ANSI. 1998. 63: Public Key Cryptography for the Financial Services Industry, Key Agreement and Key Transport Using Elliptic Curve Cryptography. American National Standards Institute (1998)."},{"key":"e_1_3_2_1_10_1","volume-title":"David A Buell, et al.","author":"Arute Frank","year":"2019","unstructured":"Frank Arute , Kunal Arya , Ryan Babbush , Dave Bacon , Joseph C Bardin , Rami Barends , Rupak Biswas , Sergio Boixo , Fernando GSL Brandao , David A Buell, et al. 2019 . Quantum supremacy using a programmable superconducting processor. Nature 574, 7779 (2019), 505--510. Frank Arute, Kunal Arya, Ryan Babbush, Dave Bacon, Joseph C Bardin, Rami Barends, Rupak Biswas, Sergio Boixo, Fernando GSL Brandao, David A Buell, et al. 2019. Quantum supremacy using a programmable superconducting processor. Nature 574, 7779 (2019), 505--510."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92062-3_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384725"},{"key":"e_1_3_2_1_13_1","volume-title":"Technical Report","author":"Chen Cong","unstructured":"Cong Chen , Oussama Danba , Jeffrey Hoffstein , Andreas Hulsing , Joost Rijneveld , John M. Schanck , Peter Schwabe , William Whyte , Zhenfei Zhang , Tsunekazu Saito , Takashi Yamakawa , and Keita Xagawa . 2020. NTRU. Technical Report . National Institute of Standards and Technology . available at https:\/\/csrc.nist. gov\/projects\/post-quantum-cryptography\/round-3-submissions. Cong Chen, Oussama Danba, Jeffrey Hoffstein, Andreas Hulsing, Joost Rijneveld, John M. Schanck, Peter Schwabe, William Whyte, Zhenfei Zhang, Tsunekazu Saito, Takashi Yamakawa, and Keita Xagawa. 2020. NTRU. Technical Report. National Institute of Standards and Technology. available at https:\/\/csrc.nist. gov\/projects\/post-quantum-cryptography\/round-3-submissions."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467826"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324882"},{"key":"e_1_3_2_1_16_1","volume-title":"Frederik Vercauteren, Jose Maria Bermudo Mera, Michiel Van Beirendonck, and Andrea Basso.","author":"D'Anvers Jan-Pieter","year":"2020","unstructured":"Jan-Pieter D'Anvers , Angshuman Karmakar , Sujoy Sinha Roy , Frederik Vercauteren, Jose Maria Bermudo Mera, Michiel Van Beirendonck, and Andrea Basso. 2020 . SABER. Technical Report. National Institute of Standards and Technology . available at https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3- submissions. Jan-Pieter D'Anvers, Angshuman Karmakar, Sujoy Sinha Roy, Frederik Vercauteren, Jose Maria Bermudo Mera, Michiel Van Beirendonck, and Andrea Basso. 2020. SABER. Technical Report. National Institute of Standards and Technology. available at https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3- submissions."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40974-8_12"},{"key":"e_1_3_2_1_18_1","unstructured":"Oliver Dial Jerry Chow and Jay Gambetta. 2021. IBM quantum breaks the 100-qubit processor barrier. https:\/\/research.ibm.com\/blog\/127-qubit-quantumprocessor-eagle  Oliver Dial Jerry Chow and Jay Gambetta. 2021. IBM quantum breaks the 100-qubit processor barrier. https:\/\/research.ibm.com\/blog\/127-qubit-quantumprocessor-eagle"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2020-0006"},{"key":"e_1_3_2_1_20_1","unstructured":"ETSI. 2020. ETSI releases migration strategies and recommendations for Quantum-Safe schemes. https:\/\/www.etsi.org\/newsroom\/press-releases\/1805- 2020-08-etsi-releases-migration-strategies-and-recommendations-forquantum-safe-schemes  ETSI. 2020. ETSI releases migration strategies and recommendations for Quantum-Safe schemes. https:\/\/www.etsi.org\/newsroom\/press-releases\/1805- 2020-08-etsi-releases-migration-strategies-and-recommendations-forquantum-safe-schemes"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Cryptology and Information Security in Latin America. Springer, 109--127","author":"Fujii Hayato","year":"2017","unstructured":"Hayato Fujii and Diego F Aranha . 2017 . Curve25519 for the Cortex-M4 and beyond . In International Conference on Cryptology and Information Security in Latin America. Springer, 109--127 . Hayato Fujii and Diego F Aranha. 2017. Curve25519 for the Cortex-M4 and beyond. In International Conference on Cryptology and Information Security in Latin America. Springer, 109--127."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119618232"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_2_1_24_1","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 29--37","author":"G\u00fcnther Christoph G","year":"1989","unstructured":"Christoph G G\u00fcnther . 1989 . An identity-based key-exchange protocol . In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 29--37 . Christoph G G\u00fcnther. 1989. An identity-based key-exchange protocol. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 29--37."},{"key":"e_1_3_2_1_25_1","first-page":"379","article-title":"Post-quantum WireGuard","volume":"2020","author":"H\u00fclsing Andreas","year":"2020","unstructured":"Andreas H\u00fclsing , Kai-Chun Ning , Peter Schwabe , Florian Weber , and Ralf Zimmermann . 2020 . Post-quantum WireGuard . IACR Cryptol. ePrint Arch. 2020 (2020), 379 . Andreas H\u00fclsing, Kai-Chun Ning, Peter Schwabe, Florian Weber, and Ralf Zimmermann. 2020. Post-quantum WireGuard. IACR Cryptol. ePrint Arch. 2020 (2020), 379.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323402"},{"key":"e_1_3_2_1_27_1","volume-title":"Product Brief: SLC 14 -- 65nm Innovation for SIM Cards. https:\/\/www.infineon.com\/dgdl\/SLC+14+Product+Brief+-+65nm+Innovation+ for+SIM+Cards+(2013).pdf?fileId=5546d46149b40f650149d256d791045c","year":"2022","unstructured":"Infineon. 2022 . Product Brief: SLC 14 -- 65nm Innovation for SIM Cards. https:\/\/www.infineon.com\/dgdl\/SLC+14+Product+Brief+-+65nm+Innovation+ for+SIM+Cards+(2013).pdf?fileId=5546d46149b40f650149d256d791045c Infineon. 2022. Product Brief: SLC 14 -- 65nm Innovation for SIM Cards. https:\/\/www.infineon.com\/dgdl\/SLC+14+Product+Brief+-+65nm+Innovation+ for+SIM+Cards+(2013).pdf?fileId=5546d46149b40f650149d256d791045c"},{"key":"e_1_3_2_1_28_1","unstructured":"Infineon. 2022. World's first post-quantum cryptography on a contactless security chip. https:\/\/www.infineon.com\/cms\/en\/product\/promopages\/post-quantumcryptography\/  Infineon. 2022. World's first post-quantum cryptography on a contactless security chip. https:\/\/www.infineon.com\/cms\/en\/product\/promopages\/post-quantumcryptography\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Intel Corporation. 2019. Intel introduces 'horse ridge' to enable commercially viable quantum computers. https:\/\/newsroom.intel.com\/news\/intel-introduceshorse-ridge-enable-commercially-viable-quantum-computers\/#gs.ngaylt  Intel Corporation. 2019. Intel introduces 'horse ridge' to enable commercially viable quantum computers. https:\/\/newsroom.intel.com\/news\/intel-introduceshorse-ridge-enable-commercially-viable-quantum-computers\/#gs.ngaylt"},{"key":"e_1_3_2_1_30_1","first-page":"280","article-title":"Implementing Grover oracles for quantum key search on AES and LowMC","volume":"2020","author":"Jaques Samuel","year":"2020","unstructured":"Samuel Jaques , Michael Naehrig , Martin Roetteler , and Fernando Virdia . 2020 . Implementing Grover oracles for quantum key search on AES and LowMC . Advances in Cryptology--EUROCRYPT 2020 12106 (2020), 280 . Samuel Jaques, Michael Naehrig, Martin Roetteler, and Fernando Virdia. 2020. Implementing Grover oracles for quantum key search on AES and LowMC. Advances in Cryptology--EUROCRYPT 2020 12106 (2020), 280.","journal-title":"Advances in Cryptology--EUROCRYPT"},{"key":"e_1_3_2_1_31_1","unstructured":"DongHyun Je. 2021. Towards 6G Security: Technology Trends Threats and Solutions. https:\/\/research.samsung.com\/blog\/Towards-6G-Security-TechnologyTrends-Threats-and-Solutions  DongHyun Je. 2021. Towards 6G Security: Technology Trends Threats and Solutions. https:\/\/research.samsung.com\/blog\/Towards-6G-Security-TechnologyTrends-Threats-and-Solutions"},{"key":"e_1_3_2_1_32_1","volume-title":"The Argument against Quantum Computers, the Quantum Laws of Nature, and Google's Supremacy Claims. arXiv preprint arXiv:2008.05188","author":"Kalai Gil","year":"2020","unstructured":"Gil Kalai . 2020. The Argument against Quantum Computers, the Quantum Laws of Nature, and Google's Supremacy Claims. arXiv preprint arXiv:2008.05188 ( 2020 ). Gil Kalai. 2020. The Argument against Quantum Computers, the Quantum Laws of Nature, and Google's Supremacy Claims. arXiv preprint arXiv:2008.05188 (2020)."},{"key":"e_1_3_2_1_33_1","unstructured":"Matthias J Kannwischer Joost Rijneveld Peter Schwabe and Ko Stoffelen. 2019. pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. (2019).  Matthias J Kannwischer Joost Rijneveld Peter Schwabe and Ko Stoffelen. 2019. pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"Introduction to modern cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell . 2020. Introduction to modern cryptography . CRC press . Jonathan Katz and Yehuda Lindell. 2020. Introduction to modern cryptography. CRC press."},{"key":"e_1_3_2_1_35_1","volume-title":"Annual international cryptology conference","author":"Kocher Paul","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential power analysis . In Annual international cryptology conference . Springer , 388--397. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential power analysis. In Annual international cryptology conference. Springer, 388--397."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_24"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341475"},{"key":"e_1_3_2_1_38_1","unstructured":"Microsoft. 2022. Cryptography in the era of quantum computers. https:\/\/www. microsoft.com\/en-us\/research\/project\/post-quantum-cryptography\/  Microsoft. 2022. Cryptography in the era of quantum computers. https:\/\/www. microsoft.com\/en-us\/research\/project\/post-quantum-cryptography\/"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101825"},{"key":"e_1_3_2_1_40_1","volume-title":"Cybersecurity in an Era with Quantum Computers: Will We Be Ready? IEEE Security & Privacy 16 (09","author":"Mosca Michele","year":"2018","unstructured":"Michele Mosca . 2018. Cybersecurity in an Era with Quantum Computers: Will We Be Ready? IEEE Security & Privacy 16 (09 2018 ), 38--41. https:\/\/doi.org\/10. 1109\/MSP.2018.3761723 Michele Mosca. 2018. Cybersecurity in an Era with Quantum Computers: Will We Be Ready? IEEE Security & Privacy 16 (09 2018), 38--41. https:\/\/doi.org\/10. 1109\/MSP.2018.3761723"},{"key":"e_1_3_2_1_41_1","volume-title":"Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis","author":"Ngo Kalle","unstructured":"Kalle Ngo , Elena Dubrova , and Thomas Johansson . 2021. Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis . Association for Computing Machinery , New York, NY, USA , 51--61. https:\/\/doi.org\/10.1145\/3474376.3487277 10.1145\/3474376.3487277 Kalle Ngo, Elena Dubrova, and Thomas Johansson. 2021. Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis. Association for Computing Machinery, New York, NY, USA, 51--61. https:\/\/doi.org\/10.1145\/3474376.3487277"},{"key":"e_1_3_2_1_43_1","unstructured":"NIST. 2021. Post-Quantum Cryptography - CSRC NIST. https:\/\/csrc.nist.gov\/ projects\/post-quantum-cryptography  NIST. 2021. Post-Quantum Cryptography - CSRC NIST. https:\/\/csrc.nist.gov\/ projects\/post-quantum-cryptography"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108137"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358649"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_15"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3465747"},{"key":"e_1_3_2_1_48_1","unstructured":"John Proos and Christof Zalka. 2004. Shor's discrete logarithm quantum algorithm for elliptic curves. arXiv:quant-ph\/0301141 [quant-ph]  John Proos and Christof Zalka. 2004. Shor's discrete logarithm quantum algorithm for elliptic curves. arXiv:quant-ph\/0301141 [quant-ph]"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_9"},{"key":"e_1_3_2_1_50_1","unstructured":"Rigetti Computing. 2021. Rigetti computing announces next-generation 40Q and 80Q Quantum Systems. https:\/\/www.globenewswire.com\/newsrelease\/2021\/12\/15\/2352647\/0\/en\/Rigetti-Computing-Announces-NextGeneration-40Q-and-80Q-Quantum-Systems.html  Rigetti Computing. 2021. Rigetti computing announces next-generation 40Q and 80Q Quantum Systems. https:\/\/www.globenewswire.com\/newsrelease\/2021\/12\/15\/2352647\/0\/en\/Rigetti-Computing-Announces-NextGeneration-40Q-and-80Q-Quantum-Systems.html"},{"key":"e_1_3_2_1_51_1","volume-title":"Statistical aspects of the quantum supremacy demonstration. arXiv preprint arXiv:2008.05177","author":"Rinott Yosef","year":"2020","unstructured":"Yosef Rinott , Tomer Shoham , and Gil Kalai . 2020. Statistical aspects of the quantum supremacy demonstration. arXiv preprint arXiv:2008.05177 ( 2020 ). Yosef Rinott, Tomer Shoham, and Gil Kalai. 2020. Statistical aspects of the quantum supremacy demonstration. arXiv preprint arXiv:2008.05177 (2020)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_9"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud48802.2020.00012"},{"key":"e_1_3_2_1_54_1","volume-title":"Technical Report","author":"Schwabe Peter","unstructured":"Peter Schwabe , Roberto Avanzi , Joppe Bos , L\u00e9o Ducas , Eike Kiltz , Tancr\u00e8de Lepoint , Vadim Lyubashevsky , John M. Schanck , Gregor Seiler , and Damien Stehl\u00e9 . 2020. CRYSTALS- KYBER. Technical Report . National Institute of Standards and Technology . available at https:\/\/csrc.nist.gov\/projects\/post-quantumcryptography\/round-3-submissions. Peter Schwabe, Roberto Avanzi, Joppe Bos, L\u00e9o Ducas, Eike Kiltz, Tancr\u00e8de Lepoint, Vadim Lyubashevsky, John M. Schanck, Gregor Seiler, and Damien Stehl\u00e9. 2020. CRYSTALS-KYBER. Technical Report. National Institute of Standards and Technology. available at https:\/\/csrc.nist.gov\/projects\/post-quantumcryptography\/round-3-submissions."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23236"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539795293172"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453082"},{"key":"e_1_3_2_1_59_1","volume-title":"Forecast 5G-enabled smartphone shipments as share of total smartphone shipments worldwide from 2019 to","year":"2023","unstructured":"Statista. 2021. Forecast 5G-enabled smartphone shipments as share of total smartphone shipments worldwide from 2019 to 2023 . Statista. 2021. Forecast 5G-enabled smartphone shipments as share of total smartphone shipments worldwide from 2019 to 2023."},{"key":"e_1_3_2_1_60_1","unstructured":"Daehyun Strobel. 2007. IMSI-Catcher. Technical Report. http:\/\/citeseerx.ist.psu. edu\/viewdoc\/download?doi=10.1.1.397.8140&rep=rep1&type=pdf  Daehyun Strobel. 2007. IMSI-Catcher. Technical Report. http:\/\/citeseerx.ist.psu. edu\/viewdoc\/download?doi=10.1.1.397.8140&rep=rep1&type=pdf"},{"key":"e_1_3_2_1_61_1","unstructured":"T\u00dcVit. 2022. Post-Quantum Cryptography: IT Security in the Era of Quantum Technology. https:\/\/www.tuvit.de\/en\/innovations\/post-quantum-cryptography\/  T\u00dcVit. 2022. Post-Quantum Cryptography: IT Security in the Era of Quantum Technology. https:\/\/www.tuvit.de\/en\/innovations\/post-quantum-cryptography\/"},{"key":"e_1_3_2_1_62_1","volume-title":"Defeating IMSI Catchers. CCS '15","author":"van den Broek Fabian","year":"2015","unstructured":"Fabian van den Broek , Roel Verdult , and Joeri de Ruiter . 2015 . Defeating IMSI Catchers. CCS '15 (2015), 340--351. https:\/\/doi.org\/10.1145\/2810103.2813615 10.1145\/2810103.2813615 Fabian van den Broek, Roel Verdult, and Joeri de Ruiter. 2015. Defeating IMSI Catchers. CCS '15 (2015), 340--351. https:\/\/doi.org\/10.1145\/2810103.2813615"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Jing Yang and Thomas Johansson. 2020. An overview of cryptographic primitives for possible use in 5G and beyond. Science China Inf  Jing Yang and Thomas Johansson. 2020. An overview of cryptographic primitives for possible use in 5G and beyond. Science China Inf","DOI":"10.1007\/s11432-019-2907-4"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:27Z","timestamp":1750191147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":61,"alternative-id":["10.1145\/3507657.3528540","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528540","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}