{"id":"https://openalex.org/W2978876227","doi":"https://doi.org/10.5220/0008162800910098","title":"Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques","display_name":"Paradigm of Post-quantum Cryptography and Crypto-agility: Strategy Approach of Quantum-safe Techniques","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2978876227","doi":"https://doi.org/10.5220/0008162800910098","mag":"2978876227"},"language":"en","primary_location":{"id":"doi:10.5220/0008162800910098","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0008162800910098","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0008162800910098","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048627489","display_name":"Olaf Grote","orcid":"https://orcid.org/0000-0003-4158-5538"},"institutions":[{"id":"https://openalex.org/I88060688","display_name":"Universidad Polit\u00e9cnica de Madrid","ror":"https://ror.org/03n6nwv02","country_code":"ES","type":"education","lineage":["https://openalex.org/I88060688"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Olaf Grote","raw_affiliation_strings":["ETS de Ingenier\u00eda y Sistemas de Telecomunicaci\u00f3n, University Polit\u00e9cnica de Madrid, Campus Sur, Ctra. Valencia, 28031 Madrid and Spain, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"ETS de Ingenier\u00eda y Sistemas de Telecomunicaci\u00f3n, University Polit\u00e9cnica de Madrid, Campus Sur, Ctra. Valencia, 28031 Madrid and Spain, --- Select a Country ---","institution_ids":["https://openalex.org/I88060688"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064789722","display_name":"Andreas Ahrens","orcid":"https://orcid.org/0000-0002-7664-9450"},"institutions":[{"id":"https://openalex.org/I162015237","display_name":"Wismar University of Applied Sciences","ror":"https://ror.org/00s1ckt27","country_code":"DE","type":"education","lineage":["https://openalex.org/I162015237"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Andreas Ahrens","raw_affiliation_strings":["Hochschule Wismar, University of Applied Sciences - Technology, Business and Design, Philipp-M\u00fcller-Stra\u00dfe 14, 23966 Wismar and Germany, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Hochschule Wismar, University of Applied Sciences - Technology, Business and Design, Philipp-M\u00fcller-Stra\u00dfe 14, 23966 Wismar and Germany, --- Select a Country ---","institution_ids":["https://openalex.org/I162015237"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057753880","display_name":"C\u00e9sar Benavente-Peces","orcid":"https://orcid.org/0000-0002-2734-890X"},"institutions":[{"id":"https://openalex.org/I88060688","display_name":"Universidad Polit\u00e9cnica de Madrid","ror":"https://ror.org/03n6nwv02","country_code":"ES","type":"education","lineage":["https://openalex.org/I88060688"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"C\u00e9sar Benavente-Peces","raw_affiliation_strings":["ETS de Ingenier\u00eda y Sistemas de Telecomunicaci\u00f3n, University Polit\u00e9cnica de Madrid, Campus Sur, Ctra. Valencia, 28031 Madrid and Spain, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"ETS de Ingenier\u00eda y Sistemas de Telecomunicaci\u00f3n, University Polit\u00e9cnica de Madrid, Campus Sur, Ctra. Valencia, 28031 Madrid and Spain, --- Select a Country ---","institution_ids":["https://openalex.org/I88060688"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048627489"],"corresponding_institution_ids":["https://openalex.org/I88060688"],"apc_list":null,"apc_paid":null,"fwci":0.5779,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.76288984,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"98"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9629999995231628,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.7584028244018555},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6080009937286377},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5972915887832642},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.5053728222846985},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.339149534702301},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3344622552394867},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.21904194355010986},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.18283140659332275},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.14828407764434814}],"concepts":[{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.7584028244018555},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6080009937286377},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5972915887832642},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.5053728222846985},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.339149534702301},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3344622552394867},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.21904194355010986},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.18283140659332275},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.14828407764434814}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.5220/0008162800910098","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0008162800910098","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.fiu.edu:srhreports-3140","is_oa":true,"landing_page_url":"https://digitalcommons.fiu.edu/srhreports/cybersecurity/2023/42","pdf_url":"https://pdfs.semanticscholar.org/e94d/fc68f9c7d11c7a788e543e80358834a5bc11.pdf","source":{"id":"https://openalex.org/S4306401637","display_name":"Florida International University Digital Commons (Florida International University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I19700959","host_organization_name":"Florida International University","host_organization_lineage":["https://openalex.org/I19700959"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security Research Hub Reports","raw_type":"text"},{"id":"pmh:oai:digitalcommons.fiu.edu:srhreports-3637","is_oa":false,"landing_page_url":"https://digitalcommons.fiu.edu/srhreports/cybersecurity/cybersecurity/102","pdf_url":null,"source":{"id":"https://openalex.org/S4306401637","display_name":"Florida International University Digital Commons (Florida International University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I19700959","host_organization_name":"Florida International University","host_organization_lineage":["https://openalex.org/I19700959"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security Research Hub Reports","raw_type":"text"},{"id":"pmh:oai:oa.upm.es:72437","is_oa":false,"landing_page_url":"https://oa.upm.es/72437/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196323","display_name":"UPM Digital Archive (Technical University of Madrid)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I88060688","host_organization_name":"Universidad Polit\u00e9cnica de Madrid","host_organization_lineage":["https://openalex.org/I88060688"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2019) | Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems, PECCS 2019, Vienna, Austria, September 19-20, 2019 | 19 Seb - 20 Seb 2019 | Vienna, Austria","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.5220/0008162800910098","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0008162800910098","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Pervasive and Embedded Computing and Communication Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1515595447","https://openalex.org/W1597699498","https://openalex.org/W1675339804","https://openalex.org/W2084652510","https://openalex.org/W2109371739","https://openalex.org/W2149636648","https://openalex.org/W2168676717","https://openalex.org/W2172273481","https://openalex.org/W2294173372","https://openalex.org/W2335111715","https://openalex.org/W2494078997","https://openalex.org/W2495331295","https://openalex.org/W2567388722","https://openalex.org/W2747474361","https://openalex.org/W2773410499","https://openalex.org/W2806487405","https://openalex.org/W3111297213"],"related_works":["https://openalex.org/W3173339789","https://openalex.org/W2060145807","https://openalex.org/W4248806346","https://openalex.org/W4288754535","https://openalex.org/W4385627932","https://openalex.org/W2548040793","https://openalex.org/W3008265109","https://openalex.org/W4307248189","https://openalex.org/W3093954335","https://openalex.org/W4205482204"],"abstract_inverted_index":{"Current":[0],"security":[1,26,100,112,151],"protocols":[2,152],"use":[3],"cryptographic":[4,80,143],"methods":[5,29,35],"based":[6,31,109],"on":[7,32,110],"asymmetric":[8,84],"and":[9,36,48,93,125,157,170],"symmetric":[10,105],"schemes.":[11],"These":[12,40,79],"are":[13,86,154],"used":[14],"for":[15,21,44],"encrypted":[16],"communication":[17],"of":[18,27,72,101,132,167],"information":[19],"or":[20],"general":[22],"data":[23],"encryption.":[24],"The":[25,145],"these":[28],"is":[30,107,128,135,148],"well":[33],"researched":[34],"known":[37],"mathematical":[38],"problems.":[39],"have":[41],"been":[42],"developed":[43],"common":[45],"computing":[46],"resources":[47],"with":[49,61],"the":[50,83,99,136,165],"certainty":[51],"that":[52],"they":[53],"cannot":[54],"be":[55],"broken":[56],"at":[57],"a":[58,73,123],"determinable":[59],"runtime":[60],"finite":[62],"resources.":[63],"This":[64,162],"excludes":[65],"novel":[66],"attack":[67],"vectors":[68],"such":[69],"as":[70],"those":[71],"quantum":[74,77,96,103,114,155,160],"computer":[75],"using":[76],"algorithms.":[78],"methods,":[81],"especially":[82],"schemes,":[85],"not":[87,94,108],"prepared":[88],"against":[89,113,159],"quan-":[90],"tum":[91],"attacks":[92],"considered":[95],"safe.":[97],"Even":[98],"current":[102],"safe":[104,156],"schemes":[106],"proven":[111],"attacks.":[115,161],"In":[116],"order":[117],"to":[118,139,149],"effectively":[119],"counter":[120],"this":[121,133],"threat,":[122],"new":[124,141],"effective":[126],"strategy":[127,134,166],"necessary.":[129],"One":[130],"point":[131,147],"post-quantum":[137,168],"cryptography":[138,169],"evaluate":[140],"quantum-safe":[142],"principles.":[144],"second":[146],"research":[150],"which":[153],"resistible":[158],"paper":[163],"describes":[164],"crypto-agility.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
