diff --git a/content/docs/papers/sec-protocols.md b/content/docs/papers/sec-protocols.md
index 46c14841144b4ad971cb3170aae9253355529561..6c64e0b7e080a8749e9372900951ecd39248fdea 100644
--- a/content/docs/papers/sec-protocols.md
+++ b/content/docs/papers/sec-protocols.md
@@ -6,3 +6,5 @@ type: docs
 weight: 3
 ---
 **In Progress!**
+
+In light of the recent development efforts of post-quantum cryptographic (PQC) algorithms, supported by the NIST standardization process, there is little doubt that we will have a set of accepted quantum-resistant cryptographic schemes. Thus, the question of finding suitable replacements for classical cryptographic schemes will very soon no longer be an issue for the IT-community. However, integrating new schemes into existing security protocols used in a wide variety of IT-applications is still a problem that requires solving on different levels. In this paper we present several proposed approaches regarding the integration of PQC schemes into security protocols and applications and identify the benefits and shortcomings of each. By doing so, we systematize the similarities and differences of the presented solutions, and derive a generalized approach, which is applicable to the majority of the existing use cases. On the other hand, we highlight special cases where a general integration approach is not sufficient, and requires further investigation.