{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:42:48Z","timestamp":1757619768416,"version":"3.44.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877599"},{"type":"electronic","value":"9783031877605"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87760-5_12","type":"book-chapter","created":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:48:21Z","timestamp":1753523301000},"page":"149-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Evaluation of\u00a0Post-quantum and\u00a0Hybrid Noise Protocol Variants on\u00a0Mobile Devices"],"prefix":"10.1007","author":[{"given":"Joshua","family":"Renckens","sequence":"first","affiliation":[]},{"given":"Peter B.","family":"R\u00f8nne","sequence":"additional","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,27]]},"reference":[{"key":"12_CR1","unstructured":"Alkim, E., Ducas, L., P\u00f6ppelmann, T., Schwabe, P.: Post-quantum key exchange \u2013 A new hope. In: Proceedings of the 25th USENIX Security Symposium (USS 2016), pp. 327\u2013343. USENIX Association (2016)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Alnahawi, N., M\u00fcller, J., Oupick\u1ef3, J., Wiesmaier, A.: A comprehensive survey on post-quantum TLS. IACR Commun. Cryptol. 1(2) (Jul 2024)","DOI":"10.62056\/ahee0iuc"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Angel, Y., Dowling, B., H\u00fclsing, A., Schwabe, P., Weber, F.: Post quantum Noise. In: Proceedings of the 29th ACM Conference on Computer and Communications Security (CCS 2022), pp. 97\u2013109. ACM (2022)","DOI":"10.1145\/3548606.3560577"},{"key":"12_CR4","unstructured":"Armbian Operating System Community: Armbian: Linux for ARM development boards. https:\/\/www.armbian.com (2024)"},{"key":"12_CR5","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber: Algorithm Specifications and Supporting Documentation (Version 3.02) (2021)"},{"issue":"6","key":"12_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"12_CR7","unstructured":"Donenfeld, J.A.: Wireguard: Next generation kernel network tunnel. https:\/\/www.wireguard.com\/papers\/wireguard.pdf (2020)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Dowling, B., R\u00f6sler, P., Schwenk, J.: Flexible authenticated and confidential channel establishment (fACCE): analyzing the Noise protocol framework. In: Public-Key Cryptography \u2014 PKC 2020. Lecture Notes in Computer Science, vol. 12110, pp. 341\u2013373. Springer (2020)","DOI":"10.1007\/978-3-030-45374-9_12"},{"key":"12_CR9","unstructured":"EE Limited: 4G Speed. https:\/\/business.ee.co.uk\/help\/network-and-coverage\/4g-speed-what-you-can-expect\/ (2024)"},{"key":"12_CR10","unstructured":"Gajland, P., de\u00a0Kock, B., Quaresma, M., Malavolta, G., Schwabe, P.: SWOOSH: efficient lattice-based non-interactive key exchange. In: Proceedings of the 33rd USENIX Security Symposium (USS 2024), USENIX Association (2024)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Ho, S., Protzenko, J., Bichhawat, A., Bhargavan, K.: Noise: A library of verified high-performance secure channel protocol implementations. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 107\u2013124. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833621"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Kampanakis, P., Childs-Klein, W.: The impact of data-heavy, post-quantum TLS 1.3 on the time-to-last-byte of real-world connections. IACR ePrint Archive (2024)","DOI":"10.14722\/madweb.2024.23010"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Kobeissi, N., Nicolas, G., Bhargavan, K.: Noise explorer: fully automated modeling and verification for arbitrary noise protocols. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 356\u2013370. IEEE (2019)","DOI":"10.1109\/EuroSP.2019.00034"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Langley, A., Hamburg, M., Turner, S.: Elliptic curves for security. Internet Engineering Task Force, Internet Research Task Force, RFC 7748 (Jan 2016)","DOI":"10.17487\/RFC7748"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Paquin, C., Stebila, D., Tamvada, G.: Benchmarking post-quantum cryptography in TLS. In: Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020, Paris, France, April 15\u201317, 2020, Proceedings 11, pp. 72\u201391. Springer (2020)","DOI":"10.1007\/978-3-030-44223-1_5"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Paterson, K.G., van\u00a0der Merwe, T.: Reactive and proactive standardisation of TLS. In: Security Standardisation Research \u2014 SSR 2016. Lecture Notes in Computer Science, vol. 10074, pp. 160\u2013186. Springer (2016)","DOI":"10.1007\/978-3-319-49100-4_7"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Pereira, R., et al.: Ranking programming languages by energy efficiency. Sci. Comput. Program. 205 (2021)","DOI":"10.1016\/j.scico.2021.102609"},{"key":"12_CR18","unstructured":"Perrin, T.: KEM-based Hybrid Forward Secrecy for Noise. Specification. https:\/\/github.com\/noiseprotocol\/noise_hfs_spec\/blob\/master\/output\/noise_hfs.pdf (2018)"},{"key":"12_CR19","unstructured":"Perrin, T.: The Noise Protocol Framework, Revision 34. Specification. https:\/\/noiseprotocol.org\/noise.pdf (2018)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Rescorla, E.K.: The Transport Layer Security (TLS) Protocol Version 1.3. Internet Engineering Task Force, Network Working Group, RFC 8446 (Aug 2018)","DOI":"10.17487\/RFC8446"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: Post-quantum TLS without handshake signatures. In: Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS 2020), pp. 1461\u20131480. ACM (2020)","DOI":"10.1145\/3372297.3423350"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Sheffer, Y., Holz, R., Saint-Andre, P.: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS). Internet Engineering Task Force, Using TLS in Applications Working Group, RFC 7457 (Feb 2015)","DOI":"10.17487\/rfc7457"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science (FOCS 1994), pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"12_CR24","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson, 7th edn. (2016)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Stebila, D., Mosca, M.: Post-quantum key exchange for the internet and the open quantum safe project. In: International Conference on Selected Areas in Cryptography, pp. 14\u201337. Springer (2016)","DOI":"10.1007\/978-3-319-69453-5_2"},{"key":"12_CR26","unstructured":"Weatherley, R.: Noise-C: A plain C implementation of the Noise protocol. Source code. https:\/\/github.com\/rweather\/noise-c (2023)"},{"key":"12_CR27","unstructured":"WhatsApp LLC: WhatsApp encryption overview. Technical white paper. http:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf (2020)"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87760-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T01:11:07Z","timestamp":1757293867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87760-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877599","9783031877605"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87760-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"27 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecITC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucharest","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Romania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/secitc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}