{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T23:57:15Z","timestamp":1773446235332,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T00:00:00Z","timestamp":1661212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,23]]},"DOI":"10.1145\/3538969.3544484","type":"proceedings-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T23:41:40Z","timestamp":1660779700000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Disruptive Quantum Safe Technologies"],"prefix":"10.1145","author":[{"given":"Marta Irene","family":"Garcia Cid","sequence":"first","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid &amp; Indra Sistemas, S.A."}]},{"given":"Jorge","family":"\u00c1lvaro Gonz\u00e1lez","sequence":"additional","affiliation":[{"name":"Indra Sistemas, S.A."}]},{"given":"Laura","family":"Ort\u00edz Mart\u00edn","sequence":"additional","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid"}]},{"given":"Diego","family":"Del R\u00edo G\u00f3mez","sequence":"additional","affiliation":[{"name":"Indra Sistemas, S.A."}]}],"member":"320","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2022. CRYSTALS-Dilithium Digital Signature Algorithm - IBM Documentation. https:\/\/www.ibm.com\/docs\/en\/zos\/2.5.0?topic=cryptography-crystals-dilithium-digital-signature-algorithm"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi14030073"},{"key":"e_1_3_2_2_3_1","volume-title":"Washington, DC: US Department of Commerce","author":"Alagic Gorjan","year":"2019","unstructured":"Alagic, Gorjan, Gorjan Alagic, Jacob Alperin-Sheriff, Daniel Apon, David Cooper, Quynh Dang, and Yi-Kai\u00a0Liu et al. 2019. Status report on the first round of the NIST post-quantum cryptography standardization process. Washington, DC: US Department of Commerce, National Institute of Standards and Technology (2019)."},{"key":"e_1_3_2_2_4_1","volume-title":"Quantum cryptography using any two nonorthogonal states. Physical review letters 68, 21","author":"Bennett H","year":"1992","unstructured":"Charles\u00a0H Bennett. 1992. Quantum cryptography using any two nonorthogonal states. Physical review letters 68, 21 (1992), 3121."},{"key":"e_1_3_2_2_5_1","unstructured":"Charles\u00a0H Bennett and Gilles Brassard. 2020. Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557(2020)."},{"key":"e_1_3_2_2_6_1","volume-title":"Quantum cryptography without Bell\u2019s theorem. Physical review letters 68, 5","author":"Bennett H","year":"1992","unstructured":"Charles\u00a0H Bennett, Gilles Brassard, and N\u00a0David Mermin. 1992. Quantum cryptography without Bell\u2019s theorem. Physical review letters 68, 5 (1992), 557."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"Ward Beullens. 2022. Breaking rainbow takes a weekend on a laptop. https:\/\/eprint.iacr.org\/2022\/214. Cryptology ePrint Archive(2022).","DOI":"10.1007\/978-3-031-15979-4_16"},{"key":"e_1_3_2_2_8_1","unstructured":"Evaldas Bruze. 2021. Quantum as a disruptive technology in Hybrid Threats. (2021). https:\/\/ec.europa.eu\/jrc"},{"key":"e_1_3_2_2_9_1","unstructured":"Handlungsempfehlungen\u00a0Des Bsi. 2020. Migration zu Post-Quanten-Kryptografie - Handlungsempfehlungen des BSI. (2020)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/130913687"},{"key":"e_1_3_2_2_11_1","unstructured":"Lori Cameron. 2018. IoT Meets the Military and Battlefield| IEEE Computer Society. https:\/\/www.computer.org\/publications\/tech-news\/research\/internet-of-military-battlefield-things-iomt-iobt."},{"key":"e_1_3_2_2_12_1","unstructured":"Matt Campagna and Eric Crockett. 2021. Hybrid Post-Quantum Key Encapsulation Methods (PQ KEM) for Transport Layer Security 1.2 (TLS). Internet-Draftdraft-campagna-tls-bike-sike-hybrid-07. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/html\/draft-campagna-tls-bike-sike-hybrid-07 Work in Progress."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.92.052304"},{"key":"e_1_3_2_2_14_1","volume-title":"An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature 589, 7841","author":"Chen Yu-Ao","year":"2021","unstructured":"Yu-Ao Chen, Qiang Zhang, Teng-Yun Chen, Wen-Qi Cai, Sheng-Kai Liao, Jun Zhang, Kai Chen, Juan Yin, Ji-Gang Ren, and et\u00a0al. Zhu\u00a0Chen. 2021. An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature 589, 7841 (2021), 214\u2013\u2013219."},{"key":"e_1_3_2_2_15_1","volume-title":"Nordic Conference on Secure IT Systems. Springer","author":"Joo\u00a0Yeon","year":"2019","unstructured":"Joo\u00a0Yeon CHO. 2019. Securing Optical Networks by Modern Cryptographic Techniques. In Nordic Conference on Secure IT Systems. Springer, Cham (2019), 120\u2013133."},{"key":"e_1_3_2_2_16_1","unstructured":"Tung Chou Carlos Cid S. UiB J. Gilcher T. Lange V. Maram R. Misoczki R. Niederhagen K.\u00a0G. Paterson and E. Persichetti. 2020. Classic McEliece: conservative code-based cryptography. https:\/\/classic.mceliece.org\/nist\/mceliece-20201010.pdf."},{"key":"e_1_3_2_2_17_1","unstructured":"Eric Crockett Christian Paquin and Douglas Stebila. 2019. Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. Cryptology ePrint Archive Paper 2019\/858. https:\/\/eprint.iacr.org\/2019\/858 https:\/\/eprint.iacr.org\/2019\/858."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41567-020-0892-y"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653013"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"AK Ekert. 1991. \u201cQuantum cryptography based on Bell\u2019s theorem\u201d Phys. Rev. Lett.(1991).","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"e_1_3_2_2_22_1","volume-title":"Le GHT C\u0153ur Grand Est victime d\u2019une cyberattaque","author":"C\u0153ur\u00a0Grand Est GHT","year":"2022","unstructured":"GHT C\u0153ur\u00a0Grand Est. 2022. Le GHT C\u0153ur Grand Est victime d\u2019une cyberattaque. Press release. https:\/\/ght-coeurgrandest.fr\/wp-content\/uploads\/2022\/04\/CP_Cyberattaque_GHT_Coeur_Grand_Est_21042022.pdf."},{"key":"e_1_3_2_2_23_1","volume-title":"\u201cTerrestrial Trunked Radio (TETRA)","author":"ETSI.","unstructured":"ETSI. 2006. ETSI TR 102 512: \u201cTerrestrial Trunked Radio (TETRA); Security; Security requirements analysis for modulation enhancements to TETRA\u201d. https:\/\/www.etsi.org\/deliver\/etsi_tr\/102500_102599\/102512\/01.01.01_60\/tr_102512v010101p.pdf."},{"key":"e_1_3_2_2_24_1","volume-title":"\u201cTerrestrial Trunked Radio (TETRA)","author":"ETSI.","unstructured":"ETSI. 2008. ETSI TR 102 512: \u201cTerrestrial Trunked Radio (TETRA); Security; Security requirements analysis for modulation enhancements to TETRA\u201d. https:\/\/www.etsi.org\/deliver\/etsi_tr\/102500_102599\/102512\/01.01.01_60\/tr_102512v010101p.pdf."},{"key":"e_1_3_2_2_25_1","volume-title":"CYBER","author":"ETSI.","year":"2033","unstructured":"ETSI. 2016. ETSI EG 203 310: \u201cCYBER; Post Quantum Computing Impact on ICT Systems; Recommendations on Business Continuity and Algorithm Selection\u201d. https:\/\/www.etsi.org\/deliver\/etsi_eg\/203300_203399\/203310\/01.01.01_60\/eg_203310v010101p.pdf."},{"key":"e_1_3_2_2_26_1","volume-title":"\u201cQuantum-Safe Cryptography (QSC)","author":"ETSI.","unstructured":"ETSI. 2017. ETSI GR QSC 006: \u201cQuantum-Safe Cryptography (QSC); Limits to Quantum Computing applied to symmetric key sizes\u201d. https:\/\/www.etsi.org\/deliver\/etsi_gr\/QSC\/001_099\/006\/01.01.01_60\/gr_QSC006v010101p.pdf."},{"key":"e_1_3_2_2_27_1","unstructured":"ETSI. 2022. European Telecommunications Standards Institute. https:\/\/www.etsi.org."},{"key":"e_1_3_2_2_28_1","volume-title":"The landscape of hybrid threats : a conceptual model : public version","author":"Europea Comisi\u00f3n","unstructured":"Comisi\u00f3n Europea and Centro\u00a0Com\u00fan de Investigaci\u00f3n. 2021. The landscape of hybrid threats : a conceptual model : public version. Publications Office. https:\/\/doi.org\/doi\/10.2760\/44985"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470056"},{"key":"e_1_3_2_2_30_1","unstructured":"Nicolas Gisin Gr\u00e9goire Ribordy Hugo Zbinden Damien Stucki Nicolas Brunner and Valerio Scarani. 2004. Towards practical and fast quantum cryptography. arXiv preprint quant-ph\/0411022(2004)."},{"key":"e_1_3_2_2_31_1","volume-title":"Continuous variable quantum cryptography using coherent states. Physical review letters 88, 5","author":"Grosshans Fr\u00e9d\u00e9ric","year":"2002","unstructured":"Fr\u00e9d\u00e9ric Grosshans and Philippe Grangier. 2002. Continuous variable quantum cryptography using coherent states. Physical review letters 88, 5 (2002), 057902."},{"key":"e_1_3_2_2_32_1","volume-title":"A fast quantum mechanical algorithm for database search. The 28th annual ACM symposium on Theory of computing, 212\u2013219","author":"Grover K.","unstructured":"Lov\u00a0K. Grover. 1996. A fast quantum mechanical algorithm for database search. The 28th annual ACM symposium on Theory of computing, 212\u2013219."},{"key":"e_1_3_2_2_33_1","volume-title":"\u2018Cyber-attack","author":"Guardian The","year":"2021","unstructured":"The Guardian. 2021. \u2018Cyber-attack\u2019 hits Iran\u2019s transport ministry and railways. https:\/\/www.theguardian.com\/world\/2021\/jul\/11\/cyber-attack-hits-irans-transport-ministry-and-railways."},{"key":"e_1_3_2_2_34_1","volume-title":"Atmospheric Optics: Models, Measurements, and Target-in-the-Loop Propagation, Vol.\u00a06708","author":"Hammel Steve","unstructured":"Steve Hammel. 2007. Turbulence effects on laser propagation in a marine environment. In Atmospheric Optics: Models, Measurements, and Target-in-the-Loop Propagation, Vol.\u00a06708. SPIE, 29\u201338."},{"key":"e_1_3_2_2_35_1","first-page":"61801","article-title":"Drone-based quantum key distribution","volume":"51","author":"Hill D","year":"2017","unstructured":"Alexander\u00a0D Hill, Joseph Chapman, Kyle Herndon, Christopher Chopp, Daniel\u00a0J Gauthier, and Paul Kwiat. 2017. Drone-based quantum key distribution. Urbana 51(2017), 61801\u201363003.","journal-title":"Urbana"},{"key":"e_1_3_2_2_36_1","unstructured":"Dennis Hofheinz Kathrin H\u00f6velmanns and Eike Kiltz. 2017. A Modular Analysis of the Fujisaki-Okamoto Transformation. Cryptology ePrint Archive Paper 2017\/604. https:\/\/eprint.iacr.org\/2017\/604 https:\/\/eprint.iacr.org\/2017\/604."},{"key":"e_1_3_2_2_37_1","unstructured":"Huawei. 2018. Telef\u00f3nica Huawei and UPM Perform a Groundbreaking Field Trial Applying Quantum Cryptography on Commercial Optical Networks to Provide Secure Communication Services. https:\/\/www.huawei.com\/en\/news\/2018\/6\/Telefonica-Huawei-UPM-Field-Trial."},{"key":"e_1_3_2_2_38_1","unstructured":"IBM. 2021. IBM Quantum breaks the 100 qubit processor barrier. https:\/\/research.ibm.com\/blog\/127-qubit-quantum-processor-eagle."},{"key":"e_1_3_2_2_39_1","unstructured":"IDQ. 2022. ID Quantique. https:\/\/www.idquantique.com."},{"key":"e_1_3_2_2_40_1","unstructured":"ISO. 2022. International Organization for Standardization. https:\/\/www.iso.org."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.90.042329"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"P. Jouguet S. Kunz-Jacques A. Leverrier P. Grangier and E. Diamanti. 2013. Experimental demonstration of long-distance continuous-variable quantum key distribution. Nature photonics 7 5 (2013) 378\u2013381.","DOI":"10.1038\/nphoton.2013.63"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.2010"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586131"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjqt\/s40507-021-00113-y"},{"key":"e_1_3_2_2_46_1","volume-title":"2017. Satellite-to-ground quantum key distribution. Nature 549, 7670","author":"Cai Wen-Qi","year":"2017","unstructured":"Liao, Sheng-Kai, Wen-Qi Cai, Wei-Yue Liu, Liang Zhang, Yang Li, Ji-Gang Ren, and Juan\u00a0Yin et al.2017. Satellite-to-ground quantum key distribution. Nature 549, 7670 (2017), 43\u201347."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.126.020503"},{"key":"e_1_3_2_2_48_1","volume-title":"The Madrid SDN-QKD Network. International Conference on Quantum Cryptography (QCrypt\u201918)","author":"Martin Vicente","unstructured":"Vicente Martin, Alejandro Aguado, Diego Lopez, Momtchil Peev, Victor Lopez, Antonio Pastor, Andreas Poppe, Hans Brunner, Stefano Bettelli, and Fred\u00a0Fung et al.2018. The Madrid SDN-QKD Network. International Conference on Quantum Cryptography (QCrypt\u201918)."},{"key":"e_1_3_2_2_49_1","first-page":"114","article-title":"A Public-Key Cryptosystem Based On Algebraic Coding Theory. The Deep Space Network Progress Report","volume":"42","author":"McEliece J.","year":"1978","unstructured":"R.\u00a0J. McEliece. 1978. A Public-Key Cryptosystem Based On Algebraic Coding Theory. The Deep Space Network Progress Report, DSN PR 42-44, January 1978, pp. 114-116 (1978).","journal-title":"DSN PR"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700451"},{"key":"e_1_3_2_2_52_1","unstructured":"NERC. 2022. North American Electric Reliability Corporation. https:\/\/www.nerc.com."},{"key":"e_1_3_2_2_53_1","unstructured":"Niels\u00a0MP Neumann Maran\u00a0PP van Heesch and Patrick de Graaf. 2020. Quantum communication for military applications. arXiv preprint arXiv:2011.04989(2020)."},{"key":"e_1_3_2_2_54_1","unstructured":"NIST. 2022. National Institute of Standards and Technology. https:\/\/www.nist.gov."},{"key":"e_1_3_2_2_55_1","unstructured":"NIST. 2022. Post-Quantum Cryptography. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/7\/075001"},{"key":"e_1_3_2_2_58_1","unstructured":"Oliver Pferiffer. 2020. Banking solutions from ID Quantique to ensure real-time availability of data. https:\/\/www.idquantique.com\/quantum-safe-security\/applications\/banking-solutions\/."},{"key":"e_1_3_2_2_59_1","volume-title":"Advances in quantum teleportation. Nature photonics 9, 10","author":"Eisert Jens","year":"2015","unstructured":"Pirandola, Stefano, Jens Eisert, Christian Weedbrook, Akira Furusawa, , and Samuel\u00a0L. Braunstein. 2015. Advances in quantum teleportation. Nature photonics 9, 10 (2015), 641\u2013652."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.3.043014"},{"key":"e_1_3_2_2_61_1","volume-title":"2017. Ground-to-satellite quantum teleportation. Nature 549, 7670","author":"Xu Ping","year":"2017","unstructured":"Ren, Ji-Gang, Ping Xu, Hai-Lin Yong, Liang Zhang, Sheng-Kai Liao, Juan Yin, and Wei-Yue\u00a0Liu et al.2017. Ground-to-satellite quantum teleportation. Nature 549, 7670 (2017), 70\u201373."},{"key":"e_1_3_2_2_62_1","volume-title":"Field test of quantum key distribution in the Tokyo QKD Network. Optics express 19, 11","author":"Sasaki Masahide","year":"2011","unstructured":"Masahide Sasaki, Mikio Fujiwara, H Ishizuka, W Klaus, K Wakui, M Takeoka, S Miki, T Yamashita, Z Wang, and et\u00a0al. A\u00a0Tanaka. 2011. Field test of quantum key distribution in the Tokyo QKD Network. Optics express 19, 11 (2011), 10387\u2013\u201310409."},{"key":"e_1_3_2_2_63_1","volume-title":"Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical review letters 92, 5","author":"Scarani Valerio","year":"2004","unstructured":"Valerio Scarani, Antonio Acin, Gr\u00e9goire Ribordy, and Nicolas Gisin. 2004. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical review letters 92, 5 (2004), 057901."},{"key":"e_1_3_2_2_64_1","volume-title":"Algorithms for quantum computation: discrete logarithms and factoring. The 35th annual symposium on foundations of computer science, 124\u2013134","author":"Shor W","unstructured":"Peter\u00a0W Shor. 1994. Algorithms for quantum computation: discrete logarithms and factoring. The 35th annual symposium on foundations of computer science, 124\u2013134."},{"key":"e_1_3_2_2_65_1","unstructured":"Toshiba. 2022. Toshiba. https:\/\/www.global.toshiba\/ww\/products-solutions\/security-ict\/qkd.html."},{"key":"e_1_3_2_2_66_1","volume-title":"Beating the photon-number-splitting attack in practical quantum cryptography. Physical review letters 94, 23","author":"Wang Xiang-Bin","year":"2005","unstructured":"Xiang-Bin Wang. 2005. Beating the photon-number-splitting attack in practical quantum cryptography. Physical review letters 94, 23 (2005), 230503."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"crossref","unstructured":"Y. Wu W.S. Bao S. Cao F. Chen M.C. Chen X. Chen T.H. Chung H. Deng Y. Du D. Fan and M. Gong. 2021. Strong quantum computational advantage using a superconducting quantum processor. Physical review letters 127 18 (2021) 180501.","DOI":"10.1103\/PhysRevLett.127.180501"},{"key":"e_1_3_2_2_68_1","volume-title":"Satellite-based entanglement distribution over 1200 kilometers. Science 356, 6343","author":"Yin Juan","year":"2017","unstructured":"Juan Yin, Yuan Cao, Yu-Huai Li, Sheng-Kai Liao, Liang Zhang, Ji-Gang Ren, Wen-Qi Cai, Wei-Yue Liu, Bo Li, and et\u00a0al. Hui\u00a0Dai. 2017. Satellite-based entanglement distribution over 1200 kilometers. Science 356, 6343 (2017), 1140\u2013\u20131144."}],"event":{"name":"ARES 2022: The 17th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2022"},"container-title":["Proceedings of the 17th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544484","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3538969.3544484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:58Z","timestamp":1750186798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3538969.3544484"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,23]]},"references-count":67,"alternative-id":["10.1145\/3538969.3544484","10.1145\/3538969"],"URL":"https:\/\/doi.org\/10.1145\/3538969.3544484","relation":{},"subject":[],"published":{"date-parts":[[2022,8,23]]},"assertion":[{"value":"2022-08-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}