{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:29:17Z","timestamp":1773520157777,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,2,18]]},"DOI":"10.1145\/3770761.3777201","type":"proceedings-article","created":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:18:26Z","timestamp":1770995906000},"page":"1241-1242","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Modular Approach to Teaching Post-Quantum Cryptography"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2822-4755","authenticated-orcid":false,"given":"Thomas J.","family":"Borrelli","sequence":"first","affiliation":[{"name":"Department of Computer Science, Rochester Institute of Technology, Rochester, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7093-631X","authenticated-orcid":false,"given":"Sumita","family":"Mishra","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, Rochester Institute of Technology, Rochester, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7751-1114","authenticated-orcid":false,"given":"Monika K","family":"Polak","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Rochester, Rochester, NY, US, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1470-5517","authenticated-orcid":false,"given":"Stanislaw","family":"Radziszowski","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Rochester Institute of Technology, Rochester, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,2,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3641555.3705271"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630823"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287494"},{"key":"e_1_3_2_1_4_1","volume-title":"Post-Quantum Cryptography Standardization","author":"National Institute for Standards and Technology (NIST).","year":"2022","unstructured":"National Institute for Standards and Technology (NIST). Post-Quantum Cryptography Standardization, 2022. URL: https:\/\/csrc.nist.gov\/Projects\/post-quantumcryptography\/post-quantum-cryptography-standardization."},{"key":"e_1_3_2_1_5_1","volume-title":"PQC standardization process: Announcing four candidates to be standardized, plus fourth round candidates","author":"National Institute for Standards and Technology (NIST).","year":"2022","unstructured":"National Institute for Standards and Technology (NIST). PQC standardization process: Announcing four candidates to be standardized, plus fourth round candidates, 2022. URL: https:\/\/csrc.nist.gov\/News\/2022\/pqc-candidates-to-bestandardized-and-round-4."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--57944"},{"key":"e_1_3_2_1_7_1","volume-title":"February 1","author":"Houston-Edwards Kelsey","year":"2024","unstructured":"Kelsey Houston-Edwards. Quantum-proof secrets, February 1, 2024. URL: https:\/\/www.scientificamerican.com\/article\/tomorrows-quantum-computersthreaten-todays-secrets-heres-how-to-protect-them-2\/."},{"issue":"6","key":"e_1_3_2_1_8_1","first-page":"24","article-title":"How do faculty partner while teaching interdisciplinary CSX courses: Models and experiences","volume":"32","author":"Mir Darakhshan J.","year":"2017","unstructured":"Darakhshan J. Mir, Sumita Mishra, Paul Ruvolo, Lori Pollock, and Sam Engen. How do faculty partner while teaching interdisciplinary CSX courses: Models and experiences. J. Comput. Sci. Coll., 32(6):24-33, June 2017. URL: https:\/\/dl.acm.org\/doi\/10.5555\/3069658.3069665.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2013.6685144"},{"key":"e_1_3_2_1_10_1","volume-title":"Quantum Computation and Quantum Information","author":"Nielsen Michael A.","year":"2000","unstructured":"Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, New York, 2000."},{"key":"e_1_3_2_1_11_1","volume-title":"Rieffel and Wolfgang Polak. An Introduction to Quantum Computing for Non-Physicists","author":"Eleanor","year":"2000","unstructured":"Eleanor G. Rieffel and Wolfgang Polak. An Introduction to Quantum Computing for Non-Physicists, 2000. arXiv:quant-ph\/9809016."}],"event":{"name":"SIGCSE TS 2026:The 57th ACM Technical Symposium on Computer Science Education","location":"St. Louis MO USA","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3770761.3777201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:17:44Z","timestamp":1773508664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3770761.3777201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,17]]},"references-count":11,"alternative-id":["10.1145\/3770761.3777201","10.1145\/3770761"],"URL":"https:\/\/doi.org\/10.1145\/3770761.3777201","relation":{},"subject":[],"published":{"date-parts":[[2026,2,17]]},"assertion":[{"value":"2026-02-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}