{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T18:09:55Z","timestamp":1768414195546,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819712731","type":"print"},{"value":"9789819712748","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-1274-8_10","type":"book-chapter","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:20:02Z","timestamp":1710271202000},"page":"147-162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Deploying Post-quantum Algorithms in\u00a0Existing Applications and\u00a0Embedded Devices"],"prefix":"10.1007","author":[{"given":"Petr","family":"Muzikant","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6290-2099","authenticated-orcid":false,"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,13]]},"reference":[{"key":"10_CR1","unstructured":"Preskill, J.: Quantum computing 40 years later. arXiv preprint arXiv:2106.10522 (2021). https:\/\/arxiv.org\/abs\/2106.10522"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20\u201322 November 1994, pp. 124\u2013134. IEEE Computer Society (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"10_CR3","unstructured":"Post-Quantum Cryptography. National Institute of Standards and Technology (2023). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography"},{"key":"10_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-031-20974-1_20","volume-title":"Cryptology and Network Security","author":"F Schardong","year":"2022","unstructured":"Schardong, F., et al.: Post-quantum electronic identity: adapting OpenID connect and OAuth 2.0 to the post-quantum era. In: Beresford, A.R., Patra, A., Bellini, E. (eds.) CANS 2022. LNCS, vol. 13641, pp. 371\u2013390. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20974-1_20"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"L\u00f3pez-Gonz\u00e1lez, P., et al.: A facial authentication system using postquantum- secure data generated on mobile devices. In: Proceedings of the 28th Annual International Conference on Mobile Computing and Networking. ACM (2022). https:\/\/doi.org\/10.1145\/3495243.3558761","DOI":"10.1145\/3495243.3558761"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Yao, J., Matusiewicz, K., Zimmer, V.: Post Quantum Design in SPDM for Device Authentication and Key Establishment. Cryptology ePrint Archive, Paper 2022\/1049 (2022). https:\/\/doi.org\/10.3390\/cryptography6040048. https:\/\/eprint.iacr.org\/2022\/1049.pdf","DOI":"10.3390\/cryptography6040048"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Paul, S., Scheible, P., Wiemer, F.: Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication. Cryptology ePrint Archive, Paper 2021\/1563.2021.https:\/\/doi.org\/10.3233\/JCS-210037. https:\/\/eprint.iacr.org\/2021\/1563.pdf","DOI":"10.3233\/JCS-210037"},{"key":"10_CR8","unstructured":"Stebila, D.: Key Format (2019). https:\/\/github.com\/open-quantum-safe\/liboqs\/issues\/507"},{"key":"10_CR9","unstructured":"Snetkov, N., Vakarjuk, J.: Integrating post-quantum cryptography to UXP. Technical report D-2-499. Cybernetica AS (2022). https:\/\/cyber.ee\/uploads\/PQC_UXP_report_8c97d91552.pdf"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Jones, M.: JSON Web Algorithms (JWA). Technical report (2015). https:\/\/doi.org\/10.17487\/rfc7518","DOI":"10.17487\/rfc7518"},{"key":"10_CR11","unstructured":"Ghinea, D., et al.: Hybrid Post-Quantum Signatures in Hardware Security Keys. Cryptology ePrint Archive, Paper 2022\/1225 (2022). https:\/\/eprint.iacr.org\/2022\/1225.pdf"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Sajimon, P.C., Jain, K., Krishnan, P.: Analysis of post-quantum cryptography for internet of things. In: 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE (2022). https:\/\/doi.org\/10.1109\/iciccs53718.2022.9787987","DOI":"10.1109\/iciccs53718.2022.9787987"},{"key":"10_CR13","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-031-22829-2_6","volume-title":"Security, Privacy, and Applied Cryptography Engineering","author":"R Gonzalez","year":"2022","unstructured":"Gonzalez, R., Wiggers, T.: KEMTLS vs post-quantum TLS: performance on embedded systems. In: Batina, L., Picek, S., Mondal, M. (eds.) SPACE 2022. LNCS, vol. 13783, pp. 99\u2013117. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22829-2_6"},{"key":"10_CR14","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-031-21280-2_24","volume-title":"Information Security Practice and Experience","author":"G Tasopoulos","year":"2022","unstructured":"Tasopoulos, G., et al.: Performance evaluation of post-quantum TLS 1.3 on resource-constrained embedded systems. In: Su, C., Gritzalis, D., Piuri, V. (eds.) ISPEC 2022. LNCS, vol. 13620, pp. 432\u2013451. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-21280-2_24"},{"key":"10_CR15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-031-22390-7_6","volume-title":"Information Security","author":"M Raavi","year":"2022","unstructured":"Raavi, M., et al.: QUIC protocol with post-quantum authentication. In: Susilo, W., Chen, X., Guo, F., Zhang, Y., Intan, R. (eds.) ISC 2022. LNCS, vol. 13640, pp. 84\u201391. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22390-7_6"},{"key":"10_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-030-81293-5_12","volume-title":"Post-Quantum Cryptography","author":"R Gonzalez","year":"2021","unstructured":"Gonzalez, R., et al.: Verifying post-quantum signatures in 8 kB of RAM. In: Cheon, J.H., Tillich, J.P. (eds.) PQCrypto 2021. LNCS, vol. 12841, pp. 215\u2013233. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-81293-5_12"},{"key":"10_CR17","unstructured":"Muzikant, P.: Cloud Service Access Control using Smart Cards. MAthesis. Brno University of Technology (2022). http:\/\/hdl.handle.net\/11012\/208378"},{"key":"10_CR18","unstructured":"Greuet, A.: Smartcard and Post-Quantum Crypto (2021). https:\/\/csrc.nist.gov\/Presentations\/2021\/smartcard-and-post-quantum-crypto"},{"key":"10_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-031-25319-5_14","volume-title":"Smart Card Research and Advanced Applications","author":"L Bettale","year":"2023","unstructured":"Bettale, L., De Oliveira, M., Dottax, E.: Post-quantum protocols for banking applications. In: Buhan, I., Schneider, T. (eds.) CARDIS 2022. LNCS, vol. 13820, pp. 271\u2013289. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-25319-5_14"},{"key":"10_CR20","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-030-41025-4_8","volume-title":"Innovative Security Solutions for Information Technology and Communications","author":"L Malina","year":"2020","unstructured":"Malina, L., et al.: Towards practical deployment of post-quantum cryptography on constrained platforms and hardware-accelerated platforms. In: Simion, E., G\u00e9raud-Stewart, R. (eds.) SecITC 2019. LNCS, vol. 12001, pp. 109\u2013124. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41025-4_8"},{"key":"10_CR21","unstructured":"Storage API. Espressif Systems (Shanghai) Co., Ltd. (2023). https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-reference\/storage\/index.html"},{"key":"10_CR22","unstructured":"FreeRTOS (2023). https:\/\/www.freertos.org\/"},{"key":"10_CR23","unstructured":"ESP32 Memory Types. Espressif Systems (Shanghai) Co., Ltd. (2023). https:\/\/docs.espressif.com\/projects\/esp-idf\/en\/latest\/esp32\/api-guides\/memory-types.html"},{"key":"10_CR24","unstructured":"NIST Post-Quantum: Selected Algorithms 2022. National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"}],"container-title":["Communications in Computer and Information Science","Ubiquitous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-1274-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T19:21:34Z","timestamp":1710271294000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-1274-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819712731","9789819712748"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-1274-8_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UbiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Exeter","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ubisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hpcn.exeter.ac.uk\/ubisec2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"MyReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}