{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:59:34Z","timestamp":1771462774152,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031444685","type":"print"},{"value":"9783031444692","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44469-2_15","type":"book-chapter","created":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T13:02:57Z","timestamp":1695646977000},"page":"293-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Post-quantum Hybrid KEMTLS Performance in\u00a0Simulated and\u00a0Real Network Environments"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7668-7505","authenticated-orcid":false,"given":"Alexandre Augusto","family":"Giron","sequence":"first","affiliation":[]},{"given":"Jo\u00e3o Pedro Adami","family":"do Nascimento","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Cust\u00f3dio","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8723-6168","authenticated-orcid":false,"given":"Lucas Pandolfo","family":"Perin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3167-6081","authenticated-orcid":false,"given":"V\u00edctor","family":"Mateu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Barker, E., Chen, L., Davis, R.: Recommendation for key-derivation methods in key-establishment schemes revision 2. NIST Special Publication 800, 56C (2020). https:\/\/doi.org\/10.6028\/NIST.SP.800-56Cr2","DOI":"10.6028\/NIST.SP.800-56Cr2"},{"key":"15_CR2","unstructured":"Bellare, M., Lysyanskaya, A.: Symmetric and dual PRFs from standard assumptions: a generic validation of an HMAC assumption. Cryptology ePrint Archive, Report 2015\/1198 (2015). https:\/\/ia.cr\/2015\/1198"},{"issue":"7671","key":"15_CR3","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188\u2013194 (2017). https:\/\/doi.org\/10.1038\/nature23461","journal-title":"Nature"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Beullens, W.: Breaking rainbow takes a weekend on a laptop. Cryptology ePrint Archive, Paper 2022\/214 (2022). https:\/\/eprint.iacr.org\/2022\/214","DOI":"10.1007\/978-3-031-15979-4_16"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-030-25510-7_12","volume-title":"Post-Quantum Cryptography","author":"N Bindel","year":"2019","unstructured":"Bindel, N., Brendel, J., Fischlin, M., Goncalves, B., Stebila, D.: Hybrid key encapsulation mechanisms and authenticated key exchange. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 206\u2013226. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_12"},{"key":"15_CR6","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH (preliminary version). Cryptology ePrint Archive, Paper 2022\/975 (2022). https:\/\/eprint.iacr.org\/2022\/975"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-030-88238-9_5","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2021","author":"S Celi","year":"2021","unstructured":"Celi, S., et al.: Implementing and measuring KEMTLS. In: Longa, P., R\u00e0fols, C. (eds.) LATINCRYPT 2021. LNCS, vol. 12912, pp. 88\u2013107. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88238-9_5"},{"key":"15_CR8","unstructured":"Cloudflare: Circl (cloudflare interoperable, reusable cryptographic library). Online (2021). https:\/\/github.com\/cloudflare\/circl"},{"key":"15_CR9","unstructured":"Crockett, E., Paquin, C., Stebila, D.: Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH. Cryptology ePrint Archive, Report 2019\/858 (2019)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-319-76578-5_7","volume-title":"Public-Key Cryptography \u2013 PKC 2018","author":"F Giacon","year":"2018","unstructured":"Giacon, F., Heuer, F., Poettering, B.: KEM combiners. In: Abdalla, M., Dahab, R. (eds.) PKC 2018. LNCS, vol. 10769, pp. 190\u2013218. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-76578-5_7"},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s13389-022-00288-9","volume":"13","author":"AA Giron","year":"2023","unstructured":"Giron, A.A., Cust\u00f3dio, R., Rodr\u00edguez-Henr\u00edquez, F.: Post-quantum hybrid key exchange: a systematic mapping study. J. Cryptogr. Eng. 13(1), 71\u201388 (2023). https:\/\/doi.org\/10.1007\/s13389-022-00288-9","journal-title":"J. Cryptogr. Eng."},{"key":"15_CR12","unstructured":"Giron, A.A., do Nascimento, J.P.A., Cust\u00f3dio, R., Perin, L.P.: Post-quantum hybrid KEMTLS performance in simulated and real network environments. Cryptology ePrint Archive, Paper 2022\/1639 (2022). https:\/\/eprint.iacr.org\/2022\/1639"},{"key":"15_CR13","unstructured":"Hemminger, S.: Linux network emulator. Online (2011). https:\/\/www.linux.org\/docs\/man8\/tc-netem.html"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/978-3-642-14623-7_34","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"H Krawczyk","year":"2010","unstructured":"Krawczyk, H.: Cryptographic extraction and key derivation: the HKDF scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631\u2013648. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_34"},{"key":"15_CR15","unstructured":"Moody, D.: Let\u2019s get ready to rumble- the NIST PQC competition (2018). https:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/Let-s-Get-Ready-to-Rumble-The-NIST-PQC-Competiti\/images-media\/PQCrypto-April2018_Moody.pdf"},{"key":"15_CR16","unstructured":"Mosca, M., Piani, M.: Quantum threat timeline report 2020 (2020). https:\/\/globalriskinstitute.org\/publications\/quantum-threat-timeline-report-2020\/. Accessed 20 July 2021"},{"key":"15_CR17","unstructured":"NIST: Post-quantum cryptography (2016). https:\/\/csrc.nist.gov\/Projects\/Post-Quantum-Cryptography. Accessed 26 June 2021"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-030-44223-1_5","volume-title":"Post-Quantum Cryptography","author":"C Paquin","year":"2020","unstructured":"Paquin, C., Stebila, D., Tamvada, G.: Benchmarking post-quantum cryptography in TLS. In: Ding, J., Tillich, J.-P. (eds.) PQCrypto 2020. LNCS, vol. 12100, pp. 72\u201391. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44223-1_5"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Paul, S., Kuzovkova, Y., Lahr, N., Niederhagen, R.: Mixed certificate chains for the transition to post-quantum authentication in TLS 1.3. Cryptology ePrint Archive, Report 2021\/1447 (2021). https:\/\/ia.cr\/2021\/1447","DOI":"10.1145\/3488932.3497755"},{"key":"15_CR20","unstructured":"Open Quantum Safe Project: OQS-OpenSSL github repository (2022). https:\/\/github.com\/open-quantum-safe\/openssl. Accessed 10 Mar 2022"},{"key":"15_CR21","unstructured":"Open Quantum Safe Project: liboqs-go: Go bindings for liboqs (2022). https:\/\/github.com\/open-quantum-safe\/liboqs-go. Accessed 25 Jan 2022"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.3. RFC 8446, RFC Editor (2018)","DOI":"10.17487\/RFC8446"},{"key":"15_CR23","doi-asserted-by":"publisher","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: Post-quantum TLS without handshake signatures, pp. 1461\u20131480. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3372297.3423350","DOI":"10.1145\/3372297.3423350"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-88418-5_1","volume-title":"Computer Security \u2013 ESORICS 2021","author":"P Schwabe","year":"2021","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: More efficient post-quantum KEMTLS with pre-distributed public keys. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12972, pp. 3\u201322. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88418-5_1"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In: Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, pp. 149\u2013156. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3386367.3431305"},{"key":"15_CR27","unstructured":"Stebila, D., Fluhrer, S., Gueron, S.: Hybrid key exchange in TLS 1.3 (2022). http:\/\/tools.ietf.org\/html\/draft-ietf-tls-hybrid-design-05. Internet-Draft"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-69453-5_2","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"D Stebila","year":"2017","unstructured":"Stebila, D., Mosca, M.: Post-quantum key exchange for the internet and the open quantum safe project. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 14\u201337. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_2"},{"key":"15_CR29","unstructured":"Team NP: PQC standardization process: announcing four candidates to be standardized, plus fourth round candidates (2022). https:\/\/csrc.nist.gov\/News\/2022\/pqc-candidates-to-be-standardized-and-round-4"},{"key":"15_CR30","unstructured":"Weller, D., van der Gaag, R.: Incorporating post-quantum cryptography in a microservice environment. Technical report, Security and Network Engineering - University of Amsterdam (2020)"},{"key":"15_CR31","unstructured":"Westerbaan, B.: Sizing up post-quantum signatures (2021). https:\/\/blog.cloudflare.com\/sizing-up-post-quantum-signatures\/"},{"key":"15_CR32","doi-asserted-by":"publisher","unstructured":"Zhang, S., Wang, Y., Zhou, W.: Towards secure 5G networks: a survey. Comput. Netw. 162, 106871 (2019). https:\/\/doi.org\/10.1016\/j.comnet.2019.106871. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S138912861830817X","DOI":"10.1016\/j.comnet.2019.106871"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44469-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T22:33:08Z","timestamp":1730154788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44469-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031444685","9783031444692"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44469-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quito","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ecuador","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.espe.edu.ec\/latincrypt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}