{"id":"https://openalex.org/W2989340119","doi":"https://doi.org/10.1145/3338500.3360336","title":"Post-Quantum Variants of ISO/IEC Standards","display_name":"Post-Quantum Variants of ISO/IEC Standards","publication_year":2019,"publication_date":"2019-11-07","ids":{"openalex":"https://openalex.org/W2989340119","doi":"https://doi.org/10.1145/3338500.3360336","mag":"2989340119"},"language":"en","primary_location":{"id":"doi:10.1145/3338500.3360336","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338500.3360336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101878847","display_name":"Kazuki Yoneyama","orcid":"https://orcid.org/0000-0002-2673-3830"},"institutions":[{"id":"https://openalex.org/I65143321","display_name":"Hitachi (Japan)","ror":"https://ror.org/02exqgm79","country_code":"JP","type":"company","lineage":["https://openalex.org/I65143321"]},{"id":"https://openalex.org/I6178835","display_name":"Ibaraki University","ror":"https://ror.org/00sjd5653","country_code":"JP","type":"education","lineage":["https://openalex.org/I6178835"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kazuki Yoneyama","raw_affiliation_strings":["Ibaraki University, Hitachi, Japan"],"affiliations":[{"raw_affiliation_string":"Ibaraki University, Hitachi, Japan","institution_ids":["https://openalex.org/I6178835","https://openalex.org/I65143321"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101878847"],"corresponding_institution_ids":["https://openalex.org/I6178835","https://openalex.org/I65143321"],"apc_list":null,"apc_paid":null,"fwci":0.7001,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.78608701,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"21"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.9215415120124817},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.664244532585144},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5381461381912231},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.506529688835144},{"id":"https://openalex.org/keywords/isogeny","display_name":"Isogeny","score":0.47861427068710327},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.45373812317848206},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.4257572591304779},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3859668970108032},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20954960584640503},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.19524425268173218},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1905546486377716},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1377975046634674},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.13699471950531006},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11500069499015808},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.08927765488624573},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.08552214503288269}],"concepts":[{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.9215415120124817},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.664244532585144},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5381461381912231},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.506529688835144},{"id":"https://openalex.org/C2779765290","wikidata":"https://www.wikidata.org/wiki/Q1674414","display_name":"Isogeny","level":3,"score":0.47861427068710327},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.45373812317848206},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.4257572591304779},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3859668970108032},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20954960584640503},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19524425268173218},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1905546486377716},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1377975046634674},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.13699471950531006},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11500069499015808},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.08927765488624573},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.08552214503288269},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3338500.3360336","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3338500.3360336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W43667552","https://openalex.org/W152221425","https://openalex.org/W1480477462","https://openalex.org/W1508084091","https://openalex.org/W1607264302","https://openalex.org/W2045890225","https://openalex.org/W2101803085","https://openalex.org/W2113999696","https://openalex.org/W2144562951","https://openalex.org/W2157679418","https://openalex.org/W2182054121","https://openalex.org/W2197000889","https://openalex.org/W2405015683","https://openalex.org/W2407452345","https://openalex.org/W2552090562","https://openalex.org/W2740966734","https://openalex.org/W2795189789","https://openalex.org/W2811492100","https://openalex.org/W2871359882","https://openalex.org/W2893196710","https://openalex.org/W2898839560","https://openalex.org/W2903118282","https://openalex.org/W2977328913","https://openalex.org/W3029068068","https://openalex.org/W3101994345","https://openalex.org/W3124227629","https://openalex.org/W4210896998"],"related_works":["https://openalex.org/W2964026421","https://openalex.org/W3035624381","https://openalex.org/W4285189587","https://openalex.org/W2620562333","https://openalex.org/W3194061778","https://openalex.org/W3136017984","https://openalex.org/W4386242069","https://openalex.org/W3024869997","https://openalex.org/W4319158827","https://openalex.org/W4224241849"],"abstract_inverted_index":{"ISO/IEC":[0,11,15,41],"standardizes":[1],"several":[2],"chosen":[3],"ciphertext-secure":[4],"key":[5,52],"encapsulation":[6],"mechanism":[7],"(KEM)":[8],"schemes":[9,17,30,39,48,60],"in":[10,40],"18033-2.":[12],"However,":[13],"all":[14],"KEM":[16,29,38],"are":[18,49,61],"not":[19],"quantum":[20],"resilient.":[21],"In":[22],"this":[23],"paper,":[24],"we":[25],"introduce":[26],"new":[27],"isogeny-based":[28],"(i.e.,":[31],"CSIDH-ECIES-KEM":[32],"and":[33,54],"CSIDH-PSEC-KEM)":[34],"by":[35],"modifying":[36],"Diffie-Hellman-based":[37],"standards.":[42],"The":[43,51],"main":[44],"advantage":[45],"of":[46,58,68],"our":[47,59],"compactness.":[50],"size":[53],"the":[55],"ciphertext":[56],"overhead":[57],"about":[62],"five":[63],"times":[64],"smaller":[65],"than":[66],"these":[67],"SIKE-KEM":[69],"which":[70],"is":[71],"submitted":[72],"to":[73],"NIST's":[74],"post-quantum":[75],"cryptosystems":[76],"standardization.":[77]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
