{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T13:32:51Z","timestamp":1770730371074,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031823480","type":"print"},{"value":"9783031823497","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82349-7_23","type":"book-chapter","created":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:13:13Z","timestamp":1743657193000},"page":"340-353","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Benchmarking Post-quantum Cryptography in\u00a0Ethereum-Based Blockchains"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1952-3954","authenticated-orcid":false,"given":"Patxi","family":"Juaristi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2911-2300","authenticated-orcid":false,"given":"Isaac","family":"Agudo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6251-4897","authenticated-orcid":false,"given":"Ruben","family":"Rios","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8179-8215","authenticated-orcid":false,"given":"Laura","family":"Ricci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","unstructured":"Arute, F., Arya, K., Babbush, R., et\u00a0al.: Quantum supremacy using a programmable superconducting processor. Nature 574(7779), 505\u2013510 (2019). https:\/\/doi.org\/10.1038\/s41586-019-1666-5","DOI":"10.1038\/s41586-019-1666-5"},{"key":"23_CR2","doi-asserted-by":"publisher","unstructured":"Bhatia, V., Ramkumar, K.: An efficient quantum computing technique for cracking RSA using Shor\u2019s algorithm. In: 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), pp. 89\u201394 (2020). https:\/\/doi.org\/10.1109\/ICCCA49541.2020.9250806","DOI":"10.1109\/ICCCA49541.2020.9250806"},{"key":"23_CR3","unstructured":"Brooks, M.: Quantum computing is taking on its biggest challenge: noise (2024). https:\/\/www.technologyreview.com\/2024\/01\/04\/1084783\/quantum-computing-noise-google-ibm-microsoft\/"},{"key":"23_CR4","doi-asserted-by":"publisher","unstructured":"Buser, M., et al.: A survey on exotic signatures for post-quantum blockchain: challenges and research directions. ACM Comput. Surv. 55(12) (2023).https:\/\/doi.org\/10.1145\/3572771","DOI":"10.1145\/3572771"},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Chen, J., Gan, W., Hu, M., Chen, C.M.: On the construction of a post-quantum blockchain for smart city. J. Inf. Secur. Appl. 58, 102780 (2021). https:\/\/doi.org\/10.1016\/j.jisa.2021.102780","DOI":"10.1016\/j.jisa.2021.102780"},{"key":"23_CR6","unstructured":"Cloudflare: CIRCL: cloudflare interoperable reusable cryptographic library (2024). https:\/\/pkg.go.dev\/github.com\/cloudflare\/circl\/sign\/dilithium"},{"key":"23_CR7","unstructured":"CRYSTALS Team: Cryptographic suite for algebraic lattices (crystals) (2023). https:\/\/pq-crystals.org\/"},{"key":"23_CR8","unstructured":"Daugaard, K.: Sphincsplus-golang (2023). https:\/\/github.com\/kasperdi\/SPHINCSPLUS-golang"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","volume":"8","author":"TM Fern\u00e1ndez-Caram\u00e8s","year":"2020","unstructured":"Fern\u00e1ndez-Caram\u00e8s, T.M., Fraga-Lamas, P.: Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8, 21091\u201321116 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2968985","journal-title":"IEEE Access"},{"key":"23_CR10","unstructured":"Fouque, P., Hoffstein, J., Kirchner, P., Lyubashevsky, V., et\u00a0al.: Falcon (2017). https:\/\/falcon-sign.info\/"},{"key":"23_CR11","doi-asserted-by":"publisher","unstructured":"Gao, Y.L., Chen, X.B., Chen, Y.L., Sun, Y., Niu, X.X., Yang, Y.X.: A secure cryptocurrency scheme based on post-quantum blockchain. IEEE Access 6, 27205\u201327213 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2827203","DOI":"10.1109\/ACCESS.2018.2827203"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions (2007). https:\/\/eprint.iacr.org\/2007\/432","DOI":"10.1145\/1374376.1374407"},{"key":"23_CR13","doi-asserted-by":"publisher","unstructured":"Gidney, C., Eker\u00e5, M.: How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits. Quantum 5, 433 (2021).https:\/\/doi.org\/10.22331\/q-2021-04-15-433","DOI":"10.22331\/q-2021-04-15-433"},{"key":"23_CR14","unstructured":"IBM: IBM\u2019s roadmap for scaling quantum technology. IBM (2023). https:\/\/www.ibm.com\/quantum\/blog\/ibm-quantum-roadmap"},{"key":"23_CR15","doi-asserted-by":"publisher","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001). https:\/\/doi.org\/10.1007\/s102070100002","DOI":"10.1007\/s102070100002"},{"key":"23_CR16","doi-asserted-by":"publisher","unstructured":"Li, C.Y., Chen, X.B., Chen, Y.L., Hou, Y.Y., Li, J.: A new lattice-based signature scheme in post-quantum blockchain network. IEEE Access 7, 2026\u20132033 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2018.2886554","DOI":"10.1109\/ACCESS.2018.2886554"},{"key":"23_CR17","unstructured":"National institute of standards and technology (NIST): Post-quantum cryptography (2024). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Pati, C.: Search using Grover\u2019s algorithm. National Institute of Technology Rourkela (2023). https:\/\/doi.org\/10.13140\/RG.2.2.25842.07369","DOI":"10.13140\/RG.2.2.25842.07369"},{"key":"23_CR19","unstructured":"Pornin, T.: Falcon source files (reference implementation) (2021). https:\/\/falcon-sign.info\/impl\/falcon.h.html"},{"key":"23_CR20","unstructured":"SPHINCS+ Team: Sphincs+ (2023). https:\/\/sphincs.org\/"},{"issue":"2","key":"23_CR21","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/COMST.2023.3325761","volume":"26","author":"Z Yang","year":"2024","unstructured":"Yang, Z., Alfauri, H., Farkiani, B., Jain, R., Di Pietro, R., Erbad, A.: A survey and comparison of post-quantum and quantum blockchains. IEEE Commun. Surv. Tutorials 26(2), 967\u20131002 (2024). https:\/\/doi.org\/10.1109\/COMST.2023.3325761","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"3","key":"23_CR22","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1109\/TNSE.2021.3095192","volume":"9","author":"H Yi","year":"2022","unstructured":"Yi, H.: Secure social internet of things based on post-quantum blockchain. IEEE Trans. Netw. Sci. Eng. 9(3), 950\u2013957 (2022). https:\/\/doi.org\/10.1109\/TNSE.2021.3095192","journal-title":"IEEE Trans. Netw. Sci. Eng."}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82349-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T05:13:28Z","timestamp":1743657208000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82349-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823480","9783031823497"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82349-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}