diff --git a/content/docs/refs.md b/content/docs/refs.md
index c14cb0061f76f76cbf11c4dd4e5d40eea8d7e25c..a5a8890e3b5b5e7cf7ce849b511dbfb311938574 100644
--- a/content/docs/refs.md
+++ b/content/docs/refs.md
@@ -51,8 +51,8 @@ weight: 10
 ###### [BKS19]
 [L. Botros, M. J. Kannwischer, and P. Schwabe. Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4. In J. Buchmann and T. Nitaj, A.and Rachidi, editors, Progress in Cryptology – AFRICACRYPT 2019, volume 11627, pages 209–228. Springer International Publishing, Cham, 2019. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-030-23696-0_11](http://link.springer.com/10.1007/978-3-030-23696-0_11)
 
-###### [BPS20]
-[W. Barker, W. Polk, and M. Souppaya. 2020. Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms. preprint.](https://doi.org/10.6028/NIST.CSWP.05262020-draft)
+###### [BPS21]
+[Barker, W., Polk, W., & Souppaya, M. (2021). Getting Ready for Post-Quantum Cryptography: Exploring Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms (pp. 10-10). National Institute of Standards and Technology](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf)
 
 ###### [Bra16]
 [M. Braithwaite. Experimenting with post-quantum cryptography, 2016.](https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html)
diff --git a/content/docs/related.md b/content/docs/related.md
index 4523a196df8a4294bc93bd51ae208e52218dbe5b..f8fbbdaceb29b388ad34c5917ff0a8753c0d51ee 100644
--- a/content/docs/related.md
+++ b/content/docs/related.md
@@ -11,7 +11,7 @@ A collection of survey papers and references dealing with general challenges and
 *A full reference list can  be found in the [references](../refs) section. All references are listed in alphabetical order.*
 
 - [Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility](http://arxiv.org/abs/1909.07353): A wide range of topics and challenges at a high abstraction level grouped into categories of PQC migration and crypto-agility [[OPp19]](../refs#opp19)
-- [Getting Ready for Post-Quantum Cryptography](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf): Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms [[BPS20]](../refs#bps20).
+- [Getting Ready for Post-Quantum Cryptography](https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04282021.pdf): Challenges Associated with Adopting and Using Post-Quantum Cryptographic Algorithms [[BPS21]](../refs#bps21).
 - [Practical Post-Quantum Cryptography](https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Practical.PostQuantum.Cryptography_WP_FraunhoferSIT.pdf?_=1503992279): White paper from the Fraunhofer Institute for Secure Information Technology SIT addressing challenges of PQC migration and comparison of PQC algorithms [[NIWA17]](../refs#niwa17).
 - [From Pre-Quantum to Post-Quantum IoT Security](https://ieeexplore.ieee.org/document/8932459): Challenges for PQC in IoT and comparison of the performance of PQC algorithms [[FC20]](../refs#fc20).
 - [Biggest Failures in IT Security](https://drops.dagstuhl.de/opus/volltexte/2020/11981/pdf/dagrep_v009_i011_p001_19451.pdf): A variety of problems in achieving IT security and possible strategies to solve them [[AVVY19]](../refs#avvy19).