{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:44:29Z","timestamp":1775857469164,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733820.3764679","type":"proceedings-article","created":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T10:15:48Z","timestamp":1771323348000},"page":"63-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Post-Quantum Cryptography Migration of a Physical 5G Testbed"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0221-2571","authenticated-orcid":false,"given":"Dongxi","family":"Liu","sequence":"first","affiliation":[{"name":"CSIRO's Data61, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0544-7982","authenticated-orcid":false,"given":"Seung Ick","family":"Jang","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Marsfield, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4076-5553","authenticated-orcid":false,"given":"Nazatul","family":"Sultan","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Marsfield, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0374-3593","authenticated-orcid":false,"given":"Shangqi","family":"Lai","sequence":"additional","affiliation":[{"name":"CSIRO\u2019s Data61, Clayton, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0362-2844","authenticated-orcid":false,"given":"Sid Chi-Kin","family":"Chau","sequence":"additional","affiliation":[{"name":"CSIRO\u2019s Data61, Marsfield, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8660-8698","authenticated-orcid":false,"given":"Jonathan","family":"Chan","sequence":"additional","affiliation":[{"name":"CSIRO\u2019s Data61, Eveleigh, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9564-2847","authenticated-orcid":false,"given":"Hajime","family":"Suzuki","sequence":"additional","affiliation":[{"name":"CSIRO\u2019s Data61, Marsfield, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2026,2,17]]},"reference":[{"key":"e_1_3_3_2_2_2","volume-title":"3GPP TS 33.210: Network Domain Security (NDS); IP network layer security","year":"2025","unstructured":"2025. 3GPP TS 33.210: Network Domain Security (NDS); IP network layer security. Technical Report TS 33.210. 3rd Generation Partnership Project (3GPP)."},{"key":"e_1_3_3_2_3_2","volume-title":"3GPP TS 33.501: Security architecture and procedures for 5G System","author":"(3GPP) 3rd Generation Partnership Project","year":"2025","unstructured":"3rd Generation Partnership Project (3GPP). 2025. 3GPP TS 33.501: Security architecture and procedures for 5G System. Technical Report. 3GPP."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29371-9_13"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-91823-0_7"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08344-5_18"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3324882"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23020-2_14"},{"key":"e_1_3_3_2_9_2","volume-title":"Decoding quantum-safe encryption: Key to ensuring confidentiality in networks","year":"2024","unstructured":"Ericsson. 2024. Decoding quantum-safe encryption: Key to ensuring confidentiality in networks. Technical Report. Ericsson. https:\/\/www.ericsson.com\/en\/reports-and-papers\/further-insights\/impact-of-quantum-computing-on-5g-6g-security."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Lidia\u00a0Pocero Fraile\u00a0et al.2025. Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation. IEEE Access 13 (2025) 75861\u201375884. 10.1109\/ACCESS.2025.3554010","DOI":"10.1109\/ACCESS.2025.3554010"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_17"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC59868.2024.10850437"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-49187-0_14"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Sanzida Hoque Abdullah Aydeger Engin Zeydan and Madhusanka Liyanage. 2025. Analysis of Post-Quantum Cryptography in User Equipment in 5G and Beyond. arxiv:https:\/\/arXiv.org\/abs\/2507.17074\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2507.17074","DOI":"10.1109\/LCN65610.2025.11146323"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS57970.2025.11073683"},{"key":"e_1_3_3_2_16_2","volume-title":"Transition to Post-Quantum Cryptography Standards","author":"Moody Dustin","year":"2024","unstructured":"Dustin Moody, Ray Perlner, Andrew Regenscheid, Angela Robinson, and David Cooper. 2024. Transition to Post-Quantum Cryptography Standards. Technical Report NIST IR 8547 (Initial Public Draft). NIST. https:\/\/csrc.nist.gov\/pubs\/ir\/8547\/ipd"},{"key":"e_1_3_3_2_17_2","volume-title":"Transition to Post-Quantum Cryptography Standards","author":"Moody Dustin","year":"2024","unstructured":"Dustin Moody, Ray Perlner, Andrew Regenscheid, Angela Robinson, and David Cooper. 2024. Transition to Post-Quantum Cryptography Standards. Technical Report NIST IR 8547 ipd. NIST. https:\/\/csrc.nist.gov\/pubs\/ir\/8547\/ipd."},{"key":"e_1_3_3_2_18_2","volume-title":"Canadian National Quantum-Readiness Best Practices and Guidelines","author":"Resilience\u00a0(CFDIR) Quantum-Readiness Working Group\u00a0(QRWG) of\u00a0the Canadian Forum\u00a0for Digital Infrastructure","year":"2024","unstructured":"Quantum-Readiness Working Group\u00a0(QRWG) of\u00a0the Canadian Forum\u00a0for Digital Infrastructure Resilience\u00a0(CFDIR). 2024. Canadian National Quantum-Readiness Best Practices and Guidelines. Technical Report. https:\/\/ised-isde.canada.ca\/site\/spectrum-management-telecommunications\/sites\/default\/files\/documents\/Quantum-Readiness%20Best%20Practices%20-%20v04%20-%2010%20July%202024.pdf"},{"key":"e_1_3_3_2_19_2","unstructured":"Open Quantum Safe Project. 2025. liboqs: C library for prototyping and experimenting with quantum-resistant cryptography. https:\/\/github.com\/open-quantum-safe\/liboqs. Version 0.10.1 Accessed: 2025-08-13."},{"key":"e_1_3_3_2_20_2","unstructured":"Open Quantum Safe Project. 2025. Open Quantum Safe (OQS) Provider for OpenSSL. https:\/\/github.com\/open-quantum-safe\/oqs-provider. Version 0.8.0 Accessed: 2025-08-13."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_3_2_22_2","volume-title":"Quantum-Resistant Cipher Suites for EDHOC","author":"Selander G\u00f6ran","year":"2025","unstructured":"G\u00f6ran Selander and John\u00a0Preu\u00df Mattsson. 2025. Quantum-Resistant Cipher Suites for EDHOC. Internet-Draft draft-spm-lake-pqsuites-00. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-spm-lake-pqsuites\/00\/ Work in Progress."},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_3_2_24_2","volume-title":"Hybrid key exchange in TLS 1.3","author":"Stebila Douglas","year":"2025","unstructured":"Douglas Stebila, Scott Fluhrer, and Shay Gueron. 2025. Hybrid key exchange in TLS 1.3. Internet-Draft draft-ietf-tls-hybrid-design-14. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-tls-hybrid-design\/14\/ Work in Progress."},{"key":"e_1_3_3_2_25_2","unstructured":"Thales. 2023. sk telecom and thales collaborate on post-quantum cryptogra- phy to enhance users\u2019 protection on 5g network. https:\/\/www.thalesgroup.com\/en\/worldwide\/digital-identity-and-security\/press_release\/sk-telecom-and-thales-collaborate-post"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"C. Tjhai M. Tomlinson G. Bartlett Scott Fluhrer Daniel\u00a0Van Geest Oscar Garcia-Morchon and Valery Smyslov. 2023. Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 9370. 10.17487\/RFC9370","DOI":"10.17487\/RFC9370"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528540"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon62501.2024.10685570"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Nils von Nethen Alexander Wiesmaier Nouri Alnahawi and Johanna Henrich. [n. d.]. PMMP-PQC Migration Management Process booktitle = European Interdisciplinary Cybersecurity Conference EICC 2024 Xanthi Greece June 5-6 2024 pages = 144\u2013154 publisher = ACM year = 2024 .","DOI":"10.1145\/3655693.3655719"},{"key":"e_1_3_3_2_30_2","volume-title":"KEM-based Authentication for TLS 1.3","author":"Wiggers Thom","year":"2024","unstructured":"Thom Wiggers, Sofia Celi, Peter Schwabe, Douglas Stebila, and Nick Sullivan. 2024. KEM-based Authentication for TLS 1.3. Internet-Draft draft-celi-wiggers-tls-authkem-03. Internet Engineering Task Force. https:\/\/datatracker.ietf.org\/doc\/draft-celi-wiggers-tls-authkem\/03\/ Work in Progress."}],"event":{"name":"QRSEC '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"QRSEC '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 1st ACM CCS Workshop on Quantum-Resistant Cryptography and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733820.3764679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T20:49:00Z","timestamp":1775854140000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733820.3764679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":29,"alternative-id":["10.1145\/3733820.3764679","10.1145\/3733820"],"URL":"https:\/\/doi.org\/10.1145\/3733820.3764679","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2026-02-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}