{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:12:49Z","timestamp":1774541569413,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508099","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"171-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["The Impact of Quantum Computing on Security in Emerging Technologies"],"prefix":"10.1145","author":[{"given":"Abdelrahman","family":"Abuarqoub","sequence":"first","affiliation":[{"name":"Cardiff School of Technologies, Cardiff Metropolitan University, UK"}]},{"given":"Simak","family":"Abuarqoub","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Technology, Liverpool John Moores University, United Kingdom"}]},{"given":"Ahmad","family":"Alzu'bi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Jordan University of Science and Technology, Jordan"}]},{"given":"Ammar","family":"Muthanna","sequence":"additional","affiliation":[{"name":"Department of Telecommunication Networks and Data Transmission, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Russian Federation"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"CIR Report. Available: https:\/\/cir-inc.com\/news\/quantum-computer-market-reach-us1-9-billion-2023-says-new-cir-report\/","author":"CIR.","year":"2018","unstructured":"CIR. ( 2018 ). CIR Report. Available: https:\/\/cir-inc.com\/news\/quantum-computer-market-reach-us1-9-billion-2023-says-new-cir-report\/ CIR. (2018). CIR Report. Available: https:\/\/cir-inc.com\/news\/quantum-computer-market-reach-us1-9-billion-2023-says-new-cir-report\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102331"},{"key":"e_1_3_2_1_3_1","first-page":"8105","article-title":"Report on Post-Quantum Cryptography","author":"NIST","year":"2016","unstructured":"NIST , \" Report on Post-Quantum Cryptography ,\" National Institute of Standards and Technology NISTIR 8105 , 2016 . NIST, \"Report on Post-Quantum Cryptography,\" National Institute of Standards and Technology NISTIR 8105, 2016.","journal-title":"National Institute of Standards and Technology NISTIR"},{"key":"e_1_3_2_1_4_1","unstructured":"T. Simonitearchive \"NSA Says It \u201cMust Act Now\u201d Against the Quantum Computing Threat \" The NSA MIT Technology review2016.  T. Simonitearchive \"NSA Says It \u201cMust Act Now\u201d Against the Quantum Computing Threat \" The NSA MIT Technology review2016."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2992449"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2174\/1874444301608010035"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2019.07.002"},{"key":"e_1_3_2_1_9_1","volume-title":"An Overview and Classification of Approaches to Information Extraction in Wireless Sensor Networks","author":"Alsbou'i T.","year":"2011","unstructured":"T. Alsbou'i , M. Hammoudeh , Z. Bandar , and A. Nisbet , An Overview and Classification of Approaches to Information Extraction in Wireless Sensor Networks , 2011 . T. Alsbou'i, M. Hammoudeh, Z. Bandar, and A. Nisbet, An Overview and Classification of Approaches to Information Extraction in Wireless Sensor Networks, 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7010008"},{"key":"e_1_3_2_1_11_1","first-page":"1177","volume-title":"ed Boston","author":"Gustafson J. L.","year":"2011","unstructured":"J. L. Gustafson , \"Moore's\u00a0Law,\" in Encyclopedia of Parallel Computing , D. Padua , Ed., ed Boston , MA : Springer US , 2011 , pp. 1177 - 1184 . J. L. Gustafson, \"Moore's\u00a0Law,\" in Encyclopedia of Parallel Computing, D. Padua, Ed., ed Boston, MA: Springer US, 2011, pp. 1177-1184."},{"key":"e_1_3_2_1_12_1","volume-title":"Quantum Physics","author":"Grover L. K.","year":"1996","unstructured":"L. K. Grover , \" A fast quantum mechanical algorithm for estimating the median,\" arXiv : Quantum Physics , 1996 . L. K. Grover, \"A fast quantum mechanical algorithm for estimating the median,\" arXiv: Quantum Physics, 1996."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/SFCS.1994.365700","volume-title":"discrete logarithms and factoring,\" in Proceedings 35th Annual Symposium on Foundations of Computer Science","author":"Shor P. W.","year":"1994","unstructured":"P. W. Shor , \" Algorithms for quantum computation : discrete logarithms and factoring,\" in Proceedings 35th Annual Symposium on Foundations of Computer Science , 1994 , pp. 124 - 134 . P. W. Shor, \"Algorithms for quantum computation: discrete logarithms and factoring,\" in Proceedings 35th Annual Symposium on Foundations of Computer Science, 1994, pp. 124-134."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"L. K. Grover \"A fast quantum mechanical algorithm for database search \" presented at the Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing Philadelphia Pennsylvania USA 1996.  L. K. Grover \"A fast quantum mechanical algorithm for database search \" presented at the Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing Philadelphia Pennsylvania USA 1996.","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_2_1_15_1","volume-title":"Blockchain and Quantum Computing","author":"Rodenburg B.","year":"2017","unstructured":"B. Rodenburg and S. Pappas , Blockchain and Quantum Computing , 2017 . B. Rodenburg and S. Pappas, Blockchain and Quantum Computing, 2017."},{"key":"e_1_3_2_1_16_1","volume-title":"Quantum Attacks on Bitcoin, and How to Protect Against Them,\" Ledger","author":"Aggarwal D.","year":"2017","unstructured":"D. Aggarwal , G. Brennen , T. Lee , M. Santha , and M. Tomamichel , \" Quantum Attacks on Bitcoin, and How to Protect Against Them,\" Ledger , vol. 3 , 2017 . D. Aggarwal, G. Brennen, T. Lee, M. Santha, and M. Tomamichel, \"Quantum Attacks on Bitcoin, and How to Protect Against Them,\" Ledger, vol. 3, 2017."},{"key":"e_1_3_2_1_17_1","volume-title":"The impact of quantum computing on real-world security: A 5G case study","author":"Mitchell C.","year":"2019","unstructured":"C. Mitchell , The impact of quantum computing on real-world security: A 5G case study , 2019 . C. Mitchell, The impact of quantum computing on real-world security: A 5G case study, 2019."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23474"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.126.190505"},{"key":"e_1_3_2_1_20_1","volume-title":"ed","author":"Assche G.","year":"2006","unstructured":"G. Assche , \" The BB84 protocol,\" in Quantum Cryptography and Secret-Key Distillation , G. v. Assche , Ed., ed Cambridge : Cambridge University Press , 2006 . G. Assche, \"The BB84 protocol,\" in Quantum Cryptography and Secret-Key Distillation, G. v. Assche, Ed., ed Cambridge: Cambridge University Press, 2006."},{"key":"e_1_3_2_1_21_1","volume-title":"SPHINCS: Practical stateless hash-based signatures","author":"Bernstein D.","year":"2015","unstructured":"D. Bernstein , D. Hopwood , A. H\u00fclsing , T. Lange , R. Niederhagen , L. Papachristodoulou , , SPHINCS: Practical stateless hash-based signatures vol. 9056 , 2015 . D. Bernstein, D. Hopwood, A. H\u00fclsing, T. Lange, R. Niederhagen, L. Papachristodoulou, , SPHINCS: Practical stateless hash-based signatures vol. 9056, 2015."},{"key":"e_1_3_2_1_22_1","unstructured":"R. J. McEliece \"A Public-Key Cryptosystem Based On Algebraic Coding Theory \" Deep Space Network Progress Report1978.  R. J. McEliece \"A Public-Key Cryptosystem Based On Algebraic Coding Theory \" Deep Space Network Progress Report1978."},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment,\" in 2018 IEEE International Conference on Communications (ICC)","author":"Chaudhary R.","year":"2018","unstructured":"R. Chaudhary , G. S. Aujla , N. Kumar , A. K. Das , N. Saxena , and J. J. P. C. Rodrigues , \"LaCSys : Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment,\" in 2018 IEEE International Conference on Communications (ICC) , 2018 , pp. 1 - 6 . R. Chaudhary, G. S. Aujla, N. Kumar, A. K. Das, N. Saxena, and J. J. P. C. Rodrigues, \"LaCSys: Lattice-Based Cryptosystem for Secure Communication in Smart Grid Environment,\" in 2018 IEEE International Conference on Communications (ICC), 2018, pp. 1-6."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11659-4_5"},{"key":"e_1_3_2_1_25_1","unstructured":"L. Lamport \"Constructing digital signatures from a one-way function \" Citeseer1979.  L. Lamport \"Constructing digital signatures from a one-way function \" Citeseer1979."},{"key":"e_1_3_2_1_26_1","first-page":"218","article-title":"A certified digital signature","author":"Merkle R. C.","year":"1989","unstructured":"R. C. Merkle , \" A certified digital signature ,\" in Conference on the Theory and Application of Cryptology , 1989 , pp. 218 - 238 . R. C. Merkle, \"A certified digital signature,\" in Conference on the Theory and Application of Cryptology, 1989, pp. 218-238.","journal-title":"Conference on the Theory and Application of Cryptology"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"e_1_3_2_1_28_1","volume-title":"Prob. of Control and Inf,\" ed: Theory","author":"Niederreiter H.","year":"1986","unstructured":"H. Niederreiter , \" ` `Knapsack-type cryptosystems and algebraic coding theory \u201d, Prob. of Control and Inf,\" ed: Theory , 1986 . H. Niederreiter, \"``Knapsack-type cryptosystems and algebraic coding theory\u201d, Prob. of Control and Inf,\" ed: Theory, 1986."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1268"},{"key":"e_1_3_2_1_30_1","volume-title":"w","author":"O.","year":"2020","unstructured":"O. w . p. o. B. suite. ( 2020 ). BIKE - Bit Flipping Key Encapsulation . Available: https:\/\/bikesuite.org\/ O. w. p. o. B. suite. (2020). BIKE - Bit Flipping Key Encapsulation. Available: https:\/\/bikesuite.org\/"},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey","author":"Seyhan K.","year":"2021","unstructured":"K. Seyhan , T. N. Nguyen , S. Akleylek , and K. Cengiz , \" Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey ,\" Cluster Computing , pp. 1 - 20 , 2021 . K. Seyhan, T. N. Nguyen, S. Akleylek, and K. Cengiz, \"Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey,\" Cluster Computing, pp. 1-20, 2021.","journal-title":"Cluster Computing"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2903082"},{"key":"e_1_3_2_1_33_1","volume-title":"Conference, WISTP 2019, Paris, France, December 11\u201312, 2019","author":"Cheng H.","year":"2019","unstructured":"H. Cheng , D.-D. Dinu , J. Groszsch\u00e4dl , P. R\u00f8nne , and P. Ryan , \" A lightweight implementation of NTRU Prime for the post-quantum internet of things,\" in Information Security Theory and Practice, 13th IFIP WG 11.2 Int . Conference, WISTP 2019, Paris, France, December 11\u201312, 2019 , Proceedings , 2019 . H. Cheng, D.-D. Dinu, J. Groszsch\u00e4dl, P. R\u00f8nne, and P. Ryan, \"A lightweight implementation of NTRU Prime for the post-quantum internet of things,\" in Information Security Theory and Practice, 13th IFIP WG 11.2 Int. Conference, WISTP 2019, Paris, France, December 11\u201312, 2019, Proceedings, 2019."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"J. Ding \"A new variant of the Matsumoto-Imai cryptosystem through perturbation \" in International Workshop on Public Key Cryptography 2004.  J. Ding \"A new variant of the Matsumoto-Imai cryptosystem through perturbation \" in International Workshop on Public Key Cryptography 2004.","DOI":"10.1007\/978-3-540-24632-9_22"},{"key":"e_1_3_2_1_36_1","volume-title":"Cryptanalysis of HFEv and internal perturbation of HFE,\" in International Workshop on Public Key Cryptography","author":"Ding J.","year":"2005","unstructured":"J. Ding and D. Schmidt , \" Cryptanalysis of HFEv and internal perturbation of HFE,\" in International Workshop on Public Key Cryptography , 2005 . J. Ding and D. Schmidt, \"Cryptanalysis of HFEv and internal perturbation of HFE,\" in International Workshop on Public Key Cryptography, 2005."},{"key":"e_1_3_2_1_37_1","first-page":"29","article-title":"On multivariate signature-only public key cryptosystems","volume":"2001","author":"Courtois N. T.","year":"2001","unstructured":"N. T. Courtois , \" On multivariate signature-only public key cryptosystems ,\" IACR Cryptol. ePrint Arch. , vol. 2001 , p. 29 , 2001 . N. T. Courtois, \"On multivariate signature-only public key cryptosystems,\" IACR Cryptol. ePrint Arch., vol. 2001, p. 29, 2001.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_38_1","first-page":"242","article-title":"New differential-algebraic attacks and reparametrization of rainbow","author":"Ding J.","year":"2008","unstructured":"J. Ding , B.-Y. Yang , C.-H. O. Chen , M.-S. Chen , and C.-M. Cheng , \" New differential-algebraic attacks and reparametrization of rainbow ,\" in International Conference on Applied Cryptography and Network Security , 2008 , pp. 242 - 257 . J. Ding, B.-Y. Yang, C.-H. O. Chen, M.-S. Chen, and C.-M. Cheng, \"New differential-algebraic attacks and reparametrization of rainbow,\" in International Conference on Applied Cryptography and Network Security, 2008, pp. 242-257.","journal-title":"International Conference on Applied Cryptography and Network Security"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","location":"Dubai United Arab Emirates","acronym":"ICFNDS 2021"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508099","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":38,"alternative-id":["10.1145\/3508072.3508099","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508099","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}