{"id":"https://openalex.org/W4414197697","doi":"https://doi.org/10.1109/dac63849.2025.11132566","title":"Quantum-Resistant Security: PQC Readiness and Research Challenges (Invited)","display_name":"Quantum-Resistant Security: PQC Readiness and Research Challenges (Invited)","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4414197697","doi":"https://doi.org/10.1109/dac63849.2025.11132566"},"language":"en","primary_location":{"id":"doi:10.1109/dac63849.2025.11132566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac63849.2025.11132566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 62nd ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032325271","display_name":"Ashish Kundu","orcid":"https://orcid.org/0000-0003-1499-5558"},"institutions":[{"id":"https://openalex.org/I2801562743","display_name":"Cisco College","ror":"https://ror.org/03gc7jk79","country_code":"US","type":"education","lineage":["https://openalex.org/I2801562743"]},{"id":"https://openalex.org/I4210129566","display_name":"Cisco Systems (United States)","ror":null,"country_code":"US","type":null,"lineage":["https://openalex.org/I4210129566"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ashish Kundu","raw_affiliation_strings":["Cisco Research,San Jose,California,USA,95134"],"affiliations":[{"raw_affiliation_string":"Cisco Research,San Jose,California,USA,95134","institution_ids":["https://openalex.org/I4210129566","https://openalex.org/I2801562743"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071146373","display_name":"Ramana Rao Kompella","orcid":"https://orcid.org/0000-0002-7559-8997"},"institutions":[{"id":"https://openalex.org/I2801562743","display_name":"Cisco College","ror":"https://ror.org/03gc7jk79","country_code":"US","type":"education","lineage":["https://openalex.org/I2801562743"]},{"id":"https://openalex.org/I4210129566","display_name":"Cisco Systems (United States)","ror":null,"country_code":"US","type":null,"lineage":["https://openalex.org/I4210129566"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramana Kompella","raw_affiliation_strings":["Cisco Research,San Jose,California,USA,95134"],"affiliations":[{"raw_affiliation_string":"Cisco Research,San Jose,California,USA,95134","institution_ids":["https://openalex.org/I4210129566","https://openalex.org/I2801562743"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032325271"],"corresponding_institution_ids":["https://openalex.org/I2801562743","https://openalex.org/I4210129566"],"apc_list":null,"apc_paid":null,"fwci":5.399,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.95791775,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.7027000188827515,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.7027000188827515,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.6980999708175659,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.6850000023841858,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7267000079154968},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.614300012588501},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5475999712944031},{"id":"https://openalex.org/keywords/observability","display_name":"Observability","score":0.53329998254776},{"id":"https://openalex.org/keywords/financial-cryptography","display_name":"Financial cryptography","score":0.48249998688697815},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.43290001153945923},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.42080000042915344},{"id":"https://openalex.org/keywords/pkcs-#1","display_name":"PKCS #1","score":0.41679999232292175}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7267000079154968},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6891999840736389},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.614300012588501},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5475999712944031},{"id":"https://openalex.org/C36299963","wikidata":"https://www.wikidata.org/wiki/Q1369844","display_name":"Observability","level":2,"score":0.53329998254776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5303999781608582},{"id":"https://openalex.org/C515488857","wikidata":"https://www.wikidata.org/wiki/Q936407","display_name":"Financial cryptography","level":4,"score":0.48249998688697815},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.43290001153945923},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.42080000042915344},{"id":"https://openalex.org/C186497982","wikidata":"https://www.wikidata.org/wiki/Q7119499","display_name":"PKCS #1","level":4,"score":0.41679999232292175},{"id":"https://openalex.org/C165922616","wikidata":"https://www.wikidata.org/wiki/Q4241181","display_name":"Strong cryptography","level":3,"score":0.3962000012397766},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3926999866962433},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3862000107765198},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.3707999885082245},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3621000051498413},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.31839999556541443},{"id":"https://openalex.org/C19150895","wikidata":"https://www.wikidata.org/wiki/Q582616","display_name":"ID-based cryptography","level":5,"score":0.2937999963760376},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2808000147342682},{"id":"https://openalex.org/C126954023","wikidata":"https://www.wikidata.org/wiki/Q4316440","display_name":"Neural cryptography","level":4,"score":0.2671000063419342},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.25519999861717224},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.2551000118255615}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dac63849.2025.11132566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dac63849.2025.11132566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 62nd ACM/IEEE Design Automation Conference (DAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1993688167","https://openalex.org/W2084652510","https://openalex.org/W2137147061","https://openalex.org/W2168676717","https://openalex.org/W2620751099","https://openalex.org/W4280552546"],"related_works":[],"abstract_inverted_index":{"What":[0],"is":[1,99],"your":[2],"PQC-readiness\u201d":[3],"-":[4],"in":[5,32,71,158],"this":[6,11],"paper,":[7],"we":[8,148],"have":[9],"explored":[10],"problem,":[12],"some":[13,34],"of":[14,35,84,88,96,106,118,154,163,175,178],"the":[15,72,85,104,152],"key":[16],"challenges":[17],"to":[18,47,68,116,160],"address":[19],"it":[20],"and":[21,44,94,109,120,126,141,151,166,173],"how":[22],"ciphersuite":[23,155],"dependency":[24,156],"graphs":[25,157],"alongwith":[26],"observability":[27,130],"plays":[28],"a":[29,49,100,121],"vital":[30],"role":[31],"addressing":[33],"those":[36],"challenges.":[37],"Quantum":[38],"computing":[39,110],"capabilities":[40],"are":[41,66,139],"evolving":[42],"fast":[43],"on":[45,169],"course":[46],"develop":[48],"cryptographically":[50],"relevant":[51],"quantum":[52,132],"computer":[53],"(CRQC).":[54],"With":[55],"that":[56,146],"several":[57],"widely":[58],"used":[59,149],"classical":[60],"cryptography":[61,80,90,98,135,170,176],"protocols":[62,81],"such":[63],"as":[64,82],"RSA":[65],"poised":[67],"be":[69],"broken":[70],"next":[73],"few":[74],"years.":[75],"NIST":[76],"has":[77,114],"announced":[78],"three":[79],"part":[83],"first":[86],"batch":[87],"post-quantum":[89],"standards.":[91],"However,":[92],"implementation":[93],"adoption":[95],"quantum-resistant":[97],"hard":[101],"problem":[102],"given":[103],"complexities":[105],"today\u2019s":[107],"internet":[108],"stack.":[111],"Our":[112],"work":[113],"led":[115],"development":[117],"algorithms":[119],"system":[122],"Quartz":[123],"(Quantum":[124],"Risk":[125],"Threat":[127],"Analyzer)":[128],"for":[129,131,134],"vulnerabilities":[133],"suites,":[136],"where":[137],"they":[138],"used,":[140],"analyzing":[142],"their":[143],"risks.":[144],"In":[145],"context,":[147],"observability,":[150],"concept":[153],"order":[159],"determine":[161],"use":[162],"quantum-unsafe":[164],"cryptography,":[165],"its":[167],"influence":[168],"supply":[171],"chain,":[172],"generation":[174],"bill":[177],"materials":[179],"(CBOM).":[180]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
