{"id":"https://openalex.org/W6963496974","doi":"https://doi.org/10.18420/informatik2021-078","title":"On the State of Post-Quantum Cryptography Migration","display_name":"On the State of Post-Quantum Cryptography Migration","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W6963496974","doi":"https://doi.org/10.18420/informatik2021-078"},"language":"en","primary_location":{"id":"doi:10.18420/informatik2021-078","is_oa":true,"landing_page_url":"https://doi.org/10.18420/informatik2021-078","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/informatik2021-078","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Alnahawi, Nouri","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Alnahawi, Nouri","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Wiesmaier, Alexander","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wiesmaier, Alexander","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Grasmeyer, Tobias","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Grasmeyer, Tobias","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Gei\u00dfler, Julian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gei\u00dfler, Julian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zeier, Alexander","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zeier, Alexander","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Bauspie\u00df, Pia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bauspie\u00df, Pia","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Heinemann, Andreas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Heinemann, Andreas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5439,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.74126446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.36629998683929443,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.36629998683929443,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.10970000177621841,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.09049999713897705,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.7534000277519226},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.666700005531311},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6201000213623047},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.48840001225471497},{"id":"https://openalex.org/keywords/subject","display_name":"Subject (documents)","score":0.4684000015258789},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.46059998869895935}],"concepts":[{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.7534000277519226},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.682200014591217},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.666700005531311},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6201000213623047},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5895000100135803},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.48840001225471497},{"id":"https://openalex.org/C2777855551","wikidata":"https://www.wikidata.org/wiki/Q12310021","display_name":"Subject (documents)","level":2,"score":0.4684000015258789},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.46059998869895935},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.43810001015663147},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42089998722076416},{"id":"https://openalex.org/C2778464652","wikidata":"https://www.wikidata.org/wiki/Q309849","display_name":"Open research","level":2,"score":0.4009000062942505},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3926999866962433},{"id":"https://openalex.org/C89992363","wikidata":"https://www.wikidata.org/wiki/Q5961558","display_name":"Track (disk drive)","level":2,"score":0.37929999828338623},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.3725000023841858},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.299699991941452},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.2870999872684479}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/informatik2021-078","is_oa":true,"landing_page_url":"https://doi.org/10.18420/informatik2021-078","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/informatik2021-078","is_oa":true,"landing_page_url":"https://doi.org/10.18420/informatik2021-078","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","score":0.8163324594497681,"id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Safeguarding":[0],"current":[1,150],"and":[2,40,61,75,79,85,127],"future":[3],"IT":[4],"security":[5],"from":[6],"quantum":[7],"computers":[8],"implies":[9],"more":[10],"than":[11],"the":[12,36,91,115,124,128,131,143,146,149],"mere":[13],"development":[14],"of":[15,35,71,93,117,123,130],"Post-Quantum":[16],"Cryptography":[17],"(PQC)":[18],"algorithms.":[19],"Much":[20],"work":[21],"in":[22,114,133,152],"this":[23],"respect":[24],"is":[25,49],"currently":[26],"being":[27],"conducted,":[28],"making":[29],"it":[30,48],"hard":[31],"to":[32,51,89,108,120],"keep":[33,121],"track":[34,122],"many":[37],"individual":[38],"challenges":[39,56,78],"respective":[41],"solutions":[42,64,80],"so":[43],"far":[44],"identified.":[45],"In":[46],"consequence,":[47],"difficult":[50],"judge,":[52],"whether":[53,62],"all":[54],"(known)":[55],"have":[57,65],"been":[58,66],"sufficiently":[59],"addressed,":[60],"suitable":[63],"provided.":[67],"We":[68,101],"present":[69],"results":[70],"a":[72,96,118,139,153],"literature":[73],"survey":[74],"discuss":[76],"discovered":[77],"categorized":[81],"into":[82,145],"different":[83],"areas":[84],"utilize":[86],"our":[87,103],"findings":[88,104],"evaluate":[90],"state":[92,129,151],"readiness":[94],"for":[95,142],"full":[97],"scale":[98],"PQC":[99,134],"migration.":[100],"use":[102],"as":[105],"starting":[106],"point":[107],"initiate":[109],"an":[110],"open":[111],"community":[112,144],"project":[113],"form":[116],"website":[119],"ongoing":[125],"efforts":[126],"art":[132],"research.":[135],"Thereby,":[136],"we":[137],"offer":[138],"single":[140],"entry-point":[141],"subject":[147],"reflecting":[148],"timely":[154],"manner.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
