{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:44:44Z","timestamp":1774572284168,"version":"3.50.1"},"reference-count":94,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T00:00:00Z","timestamp":1649462400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T00:00:00Z","timestamp":1649462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Education","award":["MOE2018-T2-1-111"],"award-info":[{"award-number":["MOE2018-T2-1-111"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s10207-022-00587-6","type":"journal-article","created":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T05:02:38Z","timestamp":1649480558000},"page":"937-952","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Challenges of post-quantum digital signing in real-world applications: a survey"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3373-699X","authenticated-orcid":false,"given":"Teik Guan","family":"Tan","sequence":"first","affiliation":[]},{"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0594-0432","authenticated-orcid":false,"given":"Jianying","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,9]]},"reference":[{"key":"587_CR1","unstructured":"Adobe: Adobe DC Digital Signatures Guide - Supported Standards. Online: https:\/\/www.adobe.com\/devnet-docs\/acrobatetk\/tools\/DigSigDC\/standards.html [accessed: April 2021] (2018)"},{"key":"587_CR2","doi-asserted-by":"crossref","unstructured":"Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp. 99\u2013108. ACM (1996)","DOI":"10.1145\/237814.237838"},{"key":"587_CR3","doi-asserted-by":"crossref","unstructured":"Akkar, M.L., Courtois, N.T., Duteuil, R., Goubin, L.: A fast and secure implementation of sflash. In: International Workshop on Public Key Cryptography, pp. 267\u2013278. Springer (2003)","DOI":"10.1007\/3-540-36288-6_20"},{"key":"587_CR4","doi-asserted-by":"crossref","unstructured":"Alagic, G., Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Liu, Y.K., Miller, C., Moody, D., Peralta, R., et al.: Status report on the first round of the NIST post-quantum cryptography standardization process. US Department of Commerce, National Institute of Standards and Technology (2019)","DOI":"10.6028\/NIST.IR.8240"},{"key":"587_CR5","doi-asserted-by":"crossref","unstructured":"Albrecht, M.R., Hanser, C., Hoeller, A., P\u00f6ppelmann, T., Virdia, F., Wallner, A.: Implementing rlwe-based schemes using an rsa co-processor. IACR Transactions on Cryptographic Hardware and Embedded Systems pp. 169\u2013208 (2019)","DOI":"10.46586\/tches.v2019.i1.169-208"},{"key":"587_CR6","unstructured":"Augot, D., Batina, L., Bernstein, D.J., Bos, J., Buchmann, J., Castryck, W., Dunkelman, O., G\u00fcuneysu, T., Gueron, S., H\u00fclsing, A., Lange, T., Mohamed, M.S.E., Rechberger, C., Schwabe, P., Sendrier, N., Vercauteren, F., Yang, B.Y.: Initial recommendations of long-term secure post-quantum systems. Online: http:\/\/pqcrypto.eu.org\/docs\/initial-recommendations.pdf [accessed: April 2021] (2015)"},{"key":"587_CR7","unstructured":"Aumasson, J.P., Bernstein, D.J., Dobraunig, C., Eichlseder, M., Fluhrer, S., Gazdag, S.L., H\u00fclsing, A., Kampanakis, P., K\u00f6lbl, S., Lange, T., Lauridsen, M.M., Mendel, F., Niederhagen, R., Rechberger, C., Rijneveld, J., Schwabe, P.: SPHINCS$$^+$$ Submission to the NIST post-quantum project. Online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-2\/submissions\/SPHINCS-Round2.zip [accessed: April 2021] (2019)"},{"key":"587_CR8","doi-asserted-by":"crossref","unstructured":"Bai, S., Galbraith, S.D.: An improved compression technique for signatures based on learning with errors. In: Cryptographers\u2019 Track at the RSA Conference, pp. 28\u201347. Springer (2014)","DOI":"10.1007\/978-3-319-04852-9_2"},{"key":"587_CR9","doi-asserted-by":"crossref","unstructured":"Banerjee, U., Ukyab, T.S., Chandrakasan, A.P.: Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols. arXiv preprint arXiv:1910.07557 (2019)","DOI":"10.46586\/tches.v2019.i4.17-61"},{"key":"587_CR10","unstructured":"Barker, E.: SP 800-57 part 1 rev. 5 Recommendation for key management part 1: General. NIST special publication 800, 57 (2020)"},{"key":"587_CR11","doi-asserted-by":"crossref","unstructured":"Barker, W., Polk, W., Souppaya, M.: Getting ready for post-quantum cryptography: Explore challenges associated with adoption and use of post-quantum cryptographic algorithms. NIST Cybersecurity White Paper (2021)","DOI":"10.6028\/NIST.CSWP.04282021"},{"issue":"5","key":"587_CR12","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1137\/S0097539796300933","volume":"26","author":"CH Bennett","year":"1997","unstructured":"Bennett, C.H., Bernstein, E., Brassard, G., Vazirani, U.: Strengths and weaknesses of quantum computing. SIAM J. Comput. 26(5), 1510\u20131523 (1997)","journal-title":"SIAM J. Comput."},{"key":"587_CR13","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Hopwood, D., H\u00fclsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., Schneider, M., Schwabe, P., Wilcox-O\u2019Hearn, Z.: SPHINCS: practical stateless hash-based signatures. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 368\u2013397. Springer (2015)","DOI":"10.1007\/978-3-662-46800-5_15"},{"issue":"3","key":"587_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2700078","volume":"14","author":"A Boorghany","year":"2015","unstructured":"Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards. ACM Trans. Embed. Comput. Syst. (TECS) 14(3), 1\u201325 (2015)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"587_CR15","doi-asserted-by":"crossref","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS-a practical forward secure signature scheme based on minimal security assumptions. In: International Workshop on Post-Quantum Cryptography, pp. 117\u2013129. Springer (2011)","DOI":"10.1007\/978-3-642-25405-5_8"},{"key":"587_CR16","unstructured":"Casanova, A., Faugere, J.C., Macario-Rat, G., Patarin, J., Perret, L., Ryckeghem, J.: Gemss: A great multivariate short signature. Online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-2\/submissions\/GeMSS-Round2.zip [accessed: April 2021] (2019)"},{"key":"587_CR17","doi-asserted-by":"crossref","unstructured":"Chalkias, K., Brown, J., Hearn, M., Lillehagen, T., Nitto, I., Schroeter, T.: Blockchained post-quantum signatures. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1196\u20131203. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00213"},{"key":"587_CR18","unstructured":"Chase, M., Derler, D., Goldfeder, S., Katz, J., Kolesnikov, V., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D., Wang, X., Zaverucha, G.: The picnic digital signature algorithm: Update for round 2 (2019)"},{"key":"587_CR19","doi-asserted-by":"crossref","unstructured":"Chase, M., Derler, D., Goldfeder, S., Orlandi, C., Ramacher, S., Rechberger, C., Slamanig, D., Zaverucha, G.: Post-quantum zero-knowledge and signatures from symmetric-key primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1825\u20131842. ACM (2017)","DOI":"10.1145\/3133956.3133997"},{"key":"587_CR20","doi-asserted-by":"crossref","unstructured":"Chen, L., Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R., Smith-Tone, D.: NISTIR 8105: Report on post-quantum cryptography. US Department of Commerce, National Institute of Standards and Technology (2016)","DOI":"10.6028\/NIST.IR.8105"},{"key":"587_CR21","first-page":"208","volume":"800","author":"DA Cooper","year":"2020","unstructured":"Cooper, D.A., Apon, D.C., Dang, Q.H., Davidson, M.S., Dworkin, M.J., Miller, C.A.: Recommendation for stateful hash-based signature schemes. NIST Spec Publ 800, 208 (2020)","journal-title":"NIST Spec Publ"},{"key":"587_CR22","doi-asserted-by":"crossref","unstructured":"Courtois, N., Goubin, L., Meier, W., Tacier, J.D.: Solving underdefined systems of multivariate quadratic equations. In: International Workshop on Public Key Cryptography, pp. 211\u2013227. Springer (2002)","DOI":"10.1007\/3-540-45664-3_15"},{"key":"587_CR23","unstructured":"Dang, V.B., Farahmand, F., Andrzejczak, M., Mohajerani, K., Nguyen, D.T., Gaj, K.: Implementation and benchmarking of round 2 candidates in the nist post-quantum cryptography standardization process using hardware and software\/hardware co-design approaches. Cryptology ePrint Archive: Report 2020\/795 (2020)"},{"key":"587_CR24","unstructured":"Ding, J., Chen, M.S., Petzoldt, A., Schmidt, D., Yang, B.Y.: Rainbow-algorithm specification and documentation: The 2nd round proposal. Online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-2\/submissions\/Rainbow-Round2.zip [accessed: April 2021] (2019)"},{"key":"587_CR25","doi-asserted-by":"crossref","unstructured":"Dubois, V., Fouque, P.A., Shamir, A., Stern, J.: Practical cryptanalysis of SFLASH. In: Annual International Cryptology Conference, pp. 1\u201312. Springer (2007)","DOI":"10.1007\/978-3-540-74143-5_1"},{"key":"587_CR26","unstructured":"Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., Stehl\u00e9, D.: CRYSTALS\u2013Dilithium: Algorithm Specification and Supporting Documentation. Round-2 submission to the NIST PQC project (2019)"},{"key":"587_CR27","unstructured":"EEMBC: CoreMark: An EEMBC Benchark. Online: https:\/\/www.eembc.org\/coremark\/scores.php [accessed: April 2021] (2020)"},{"key":"587_CR28","unstructured":"EMVCo: EMV Integrated Circuit Card Specifications for Payment Systems Book 2 Security and Key Management Version 4.3 (2011)"},{"key":"587_CR29","unstructured":"ETSI: ETSI TS 102 778-1 V1.1.1 Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES. Online: https:\/\/www.etsi.org\/deliver\/etsi_ts\/102700_102799\/10277801\/01.01.01_60\/ts_10277801v010101p.pdf [accessed: April 2021] (2009)"},{"key":"587_CR30","unstructured":"ETSI: Quantum Safe Cryptography; Case Studies and Deployment Scenarios ETSI GR QSC 003 V1.1.1. Online: https:\/\/www.etsi.org\/deliver\/etsi_gr\/QSC\/001_099\/00301.01.01_60\/gr_QSC003v010101p.pdf [accessed: April 2021] (2017)"},{"key":"587_CR31","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 186\u2013194. Springer (1986)","DOI":"10.1007\/3-540-47721-7_12"},{"key":"587_CR32","unstructured":"FIPS, P.: 186-4: Federal information processing standards publication. Digital Signature Standard (DSS). Information Technology Laboratory, National Institute of Standards and Technology (NIST), Gaithersburg, MD (2013)"},{"key":"587_CR33","unstructured":"Fouque, P.A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., Zhang, Z.: Falcon: Fast-Fourier Lattice-based Compact Signatures over NTRU Specifications v1.1. Online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/round-2\/submissions\/Falcon-Round2.zip [accessed: April 2021] (2019) endthebibliography"},{"key":"587_CR34","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on Theory of computing, pp. 197\u2013206. ACM (2008)","DOI":"10.1145\/1374376.1374407"},{"key":"587_CR35","unstructured":"Giacomelli, I., Madsen, J., Orlandi, C.: Zkboo: Faster zero-knowledge for boolean circuits. In: 25th {USENIX} Security Symposium ({USENIX} Security 16), pp. 1069\u20131083 (2016)"},{"key":"587_CR36","volume-title":"Foundations of Cryptography: Basic Applications","author":"O Goldreich","year":"2009","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Applications. Cambridge University Press, Cambridge (2009)"},{"key":"587_CR37","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., Halevi, S.: Public-key cryptosystems from lattice reduction problems. In: Annual International Cryptology Conference, pp. 112\u2013131. Springer (1997)","DOI":"10.1007\/BFb0052231"},{"issue":"1","key":"587_CR38","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186\u2013208 (1989)","journal-title":"SIAM J. Comput."},{"issue":"2","key":"587_CR39","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"issue":"2","key":"587_CR40","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"587_CR41","unstructured":"GSMA: eSIM whitepaper: The what and how of remote sim provisioning. Online: https:\/\/www.gsma.com\/esim\/wp-content\/uploads\/2018\/06\/eSIM-Whitepaper-v4.11.pdf [accessed: April 2021] (2018)"},{"key":"587_CR42","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu, T., Lyubashevsky, V., P\u00f6ppelmann, T.: Practical lattice-based cryptography: A signature scheme for embedded systems. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 530\u2013547. Springer (2012)","DOI":"10.1007\/978-3-642-33027-8_31"},{"key":"587_CR43","unstructured":"Hanke, T., Movahedi, M., Williams, D.: Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 (2018)"},{"key":"587_CR44","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: International Algorithmic Number Theory Symposium, pp. 267\u2013288. Springer (1998)","DOI":"10.1007\/BFb0054868"},{"key":"587_CR45","doi-asserted-by":"crossref","unstructured":"H\u00fclsing, A.: W-OTS+\u2013shorter signatures for hash-based signature schemes. In: International Conference on Cryptology in Africa, pp. 173\u2013188. Springer (2013)","DOI":"10.1007\/978-3-642-38553-7_10"},{"key":"587_CR46","doi-asserted-by":"crossref","unstructured":"H\u00fclsing, A., Butin, D., Gazdag, S., Rijneveld, J., Mohaisen, A.: XMSS: eXtended Merkle signature scheme. Online: https:\/\/tools.ietf.org\/html\/rfc8391 [accessed: April 2021] (2018)","DOI":"10.17487\/RFC8391"},{"key":"587_CR47","doi-asserted-by":"crossref","unstructured":"H\u00fclsing, A., Rijneveld, J., Schwabe, P.: Armed sphincs. In: Public-Key Cryptography\u2013PKC 2016, pp. 446\u2013470. Springer (2016)","DOI":"10.1007\/978-3-662-49384-7_17"},{"key":"587_CR48","unstructured":"ICAO: Doc 9303: Machine Readable Travel Documents. Online: https:\/\/www.icao.int\/publications\/pages\/publication.aspx?docnum=9303 [accessed: April 2021] (2015)"},{"key":"587_CR49","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Zero-knowledge from secure multiparty computation. In: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, pp. 21\u201330. ACM (2007)","DOI":"10.1145\/1250790.1250794"},{"key":"587_CR50","unstructured":"ISO: ISO 32000-1:2008 Document management - Portable document format - Part 1: PDF 1.7. Online: https:\/\/www.iso.org\/standard\/51502.html [accessed: April 2021] (2013)"},{"key":"587_CR51","unstructured":"ISO: ISO\/IEC 7816-4:2013 identification cards - integrated circuit cards - part 4: Organization, security and commands for interchange. Online: https:\/\/www.iso.org\/standard\/54550.html [accessed: April 2021] (2013)"},{"key":"587_CR52","unstructured":"ITU-T, X.: Information technology\u2013Open systems interconnection\u2013The directory: public-key and attribute certificate frameworks. Online: https:\/\/www.itu.int\/rec\/T-REC-X.509-201910-I\/en [accessed: April 2021] (2019)"},{"key":"587_CR53","unstructured":"J., B.D.: ebacs: Ecrypt benchmarking of cryptographic systems. Online: https:\/\/bench.cr.yp.to\/primitives-sign.html [accessed: April 2021] (2019)"},{"key":"587_CR54","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Annual International Cryptology Conference, pp. 357\u2013388. Springer (2017)","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"587_CR55","doi-asserted-by":"crossref","unstructured":"Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 206\u2013222. Springer (1999)","DOI":"10.1007\/3-540-48910-X_15"},{"issue":"177","key":"587_CR56","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"587_CR57","unstructured":"Lamport, L.: Constructing digital signatures from a one-way function. Tech. rep., Technical Report CSL-98, SRI International Palo Alto (1979)"},{"issue":"3","key":"587_CR58","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2011.67","volume":"9","author":"R Langner","year":"2011","unstructured":"Langner, R.: Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur. Priv. 9(3), 49\u201351 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"587_CR59","doi-asserted-by":"crossref","unstructured":"Lee, C.C., Tan, T.G., Sharma, V., Zhou, J.: Quantum computing threat modelling on a generic cps setup. In: International Conference on Applied Cryptography and Network Security, pp. 171\u2013190. Springer (2021)","DOI":"10.1007\/978-3-030-81645-2_11"},{"key":"587_CR60","unstructured":"Leighton, F.T., Micali, S.: Large provably fast and secure digital signature schemes based on secure hash functions (1995). US Patent 5,432,852"},{"key":"587_CR61","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V.: Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 598\u2013616. Springer (2009)","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"587_CR62","unstructured":"Machani, S., Philpott, R., Srinivas, S., Kemp, J., Hodges, J.: FIDO UAF architectural overview. Online: https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-overview-v1.1-ps-20170202.pdf [accessed: April 2021] (2017)"},{"issue":"3","key":"587_CR63","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10207-020-00503-w","volume":"20","author":"M Manulis","year":"2021","unstructured":"Manulis, M., Bridges, C.P., Harrison, R., Sekar, V., Davis, A.: Cyber security in new space. Int. J. Inf. Secur. 20(3), 287\u2013311 (2021)","journal-title":"Int. J. Inf. Secur."},{"key":"587_CR64","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Imai, H.: Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 419\u2013453. Springer (1988)","DOI":"10.1007\/3-540-45961-8_39"},{"key":"587_CR65","first-page":"114","volume":"4244","author":"RJ McEliece","year":"1978","unstructured":"McEliece, R.J.: A public-key cryptosystem based on algebraic. Coding Thv 4244, 114\u2013116 (1978)","journal-title":"Coding Thv"},{"key":"587_CR66","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: A certified digital signature. In: Conference on the Theory and Application of Cryptology, pp. 218\u2013238. Springer (1989)","DOI":"10.1007\/0-387-34805-0_21"},{"key":"587_CR67","doi-asserted-by":"crossref","unstructured":"Miller, R.B.: Response time in man-computer conversational transactions. In: Proceedings of the December 9-11, 1968, fall joint computer conference, part I, pp. 267\u2013277 (1968)","DOI":"10.1145\/1476589.1476628"},{"key":"587_CR68","unstructured":"Moody, D.: The 2nd round of the nist pqc standardization process. Online: https:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/the-2nd-round-of-the-nist-pqc-standardization-proc\/images-media\/moody-opening-remarks.pdf [accessed: April 2021] (2019)"},{"key":"587_CR69","unstructured":"Moody, D.: NIST PQC Standardization Update - Round 2 and Beyond. Online: https:\/\/csrc.nist.gov\/CSRC\/media\/Presentations\/pqc-update-round-2-and-beyond\/images-media\/pqcrypto-sept2020-moody.pdf [accessed: April 2021] (2020)"},{"key":"587_CR70","unstructured":"multiple: Post-quantum crypto library for the arm cortex-m4. Online: https:\/\/github.com\/mupq\/pqm4 [accessed: April 2021] (2020)"},{"key":"587_CR71","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Online: https:\/\/bitcoin.org\/bitcoin.pdf [accessed: April 2021] (2008)"},{"key":"587_CR72","unstructured":"NIST: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process. Online: https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/call-for-proposals-final-dec-2016.pdf [accessed: April 2021] (2016)"},{"key":"587_CR73","doi-asserted-by":"crossref","unstructured":"Oder, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Beyond ecdsa and rsa: lattice-based digital signatures on constrained devices. In: 2014 51st ACM\/EDAC\/IEEE Design Automation Conference (DAC), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/DAC.2014.6881437"},{"key":"587_CR74","doi-asserted-by":"crossref","unstructured":"Patarin, J.: Cryptanalysis of the Matsumoto and Imai public key scheme of Eurocrypt\u201988. In: Annual International Cryptology Conference, pp. 248\u2013261. Springer (1995)","DOI":"10.1007\/3-540-44750-4_20"},{"key":"587_CR75","doi-asserted-by":"crossref","unstructured":"Patarin, J.: Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 33\u201348. Springer (1996)","DOI":"10.1007\/3-540-68339-9_4"},{"key":"587_CR76","unstructured":"Patarin, J.: The oil and vinegar signature scheme. In: Dagstuhl Workshop on Cryptography September, 1997 (1997)"},{"key":"587_CR77","doi-asserted-by":"crossref","unstructured":"Patarin, J., Courtois, N., Goubin, L.: Quartz, 128-bit long digital signatures. In: Cryptographer\u2019 Track at the RSA Conference, pp. 282\u2013297. Springer (2001)","DOI":"10.1007\/3-540-45353-9_21"},{"key":"587_CR78","unstructured":"Pornin, T.: New efficient, constant-time implementations of Falcon. Cryptology ePrint Archive, Report 2019\/893 (2019). https:\/\/eprint.iacr.org\/2019\/893"},{"key":"587_CR79","doi-asserted-by":"crossref","unstructured":"Proos, J., Zalka, C.: Shor\u2019s discrete logarithm quantum algorithm for elliptic curves. arXiv preprint arXiv:quant-ph\/0301141 (2003)","DOI":"10.26421\/QIC3.4-3"},{"key":"587_CR80","unstructured":"Qu, M.: SEC 2: Recommended elliptic curve domain parameters. Certicom Res., Mississauga, ON, Canada, Tech. Rep. SEC2-Ver-0.6 (1999)"},{"issue":"6","key":"587_CR81","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1568318.1568324","volume":"56","author":"O Regev","year":"2009","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 34 (2009)","journal-title":"J. ACM (JACM)"},{"key":"587_CR82","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.2. Online: https:\/\/tools.ietf.org\/html\/rfc5246 [accessed: April 2021] (2008)"},{"key":"587_CR83","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.3. Online: https:\/\/tools.ietf.org\/html\/rfc8446 [accessed: April 2021] (2018)","DOI":"10.17487\/RFC8446"},{"key":"587_CR84","doi-asserted-by":"crossref","unstructured":"Reyzin, L., Reyzin, N.: Better than BiBa: short one-time signatures with fast signing and verifying. In: Australasian Conference on Information Security and Privacy, pp. 144\u2013153. Springer (2002)","DOI":"10.1007\/3-540-45450-0_11"},{"issue":"2","key":"587_CR85","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"587_CR86","first-page":"145","volume":"2006","author":"A Rostovtsev","year":"2006","unstructured":"Rostovtsev, A., Stolbunov, A.: Public-key cryptosystem based on isogenies. IACR Cryptol. ePrint Arch. 2006, 145 (2006)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"587_CR87","doi-asserted-by":"crossref","unstructured":"Schaad, J., Cellars, A., Ramsdell, B., Turner, S.: Secure\/multipurpose internet mail extensions (S\/MIME) Version 4.0 message specification. Online: https:\/\/tools.ietf.org\/html\/rfc8551 [accessed: April 2021] (2019)","DOI":"10.17487\/RFC8551"},{"issue":"2","key":"587_CR88","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"587_CR89","doi-asserted-by":"crossref","unstructured":"Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: a performance study. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society (2020)","DOI":"10.14722\/ndss.2020.24203"},{"key":"587_CR90","unstructured":"SWIFT: How much do you pay for your PKI solution? Online: https:\/\/www.swift.com\/file\/ 29886\/download?token=ic6vj_vD [accessed: April 2021] (2016)"},{"issue":"2","key":"587_CR91","first-page":"184","volume":"6","author":"Y Takahashi","year":"2006","unstructured":"Takahashi, Y., Kunihiro, N.: A quantum circuit for shor\u2019s factoring algorithm using 2n+2 qubits. Quantum Inf. Comput. 6(2), 184\u2013192 (2006)","journal-title":"Quantum Inf. Comput."},{"key":"587_CR92","doi-asserted-by":"crossref","unstructured":"Tan, T.G., Zhou, J.: Layering quantum-resistance into classical digital signature algorithms. In: International Conference on Information Security, pp. 26\u201341. Springer (2021)","DOI":"10.1007\/978-3-030-91356-4_2"},{"key":"587_CR93","unstructured":"VASCO: VASCO Announces Bankruptcy Filing by DigiNotar B.V. Online: https:\/\/web.archive.org\/web\/20110923180445http:\/\/www.vasco.com\/company\/press_room\/news_archive\/2011\/news_vasco_announces_bankruptcy_filing_by_diginotar_bv.aspx [accessed: April 2021] (2011)"},{"issue":"4","key":"587_CR94","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/3241037","volume":"62","author":"P Wallden","year":"2019","unstructured":"Wallden, P., Kashefi, E.: Cyber security in the quantum era. Commun. ACM 62(4), 120 (2019)","journal-title":"Commun. ACM"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00587-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00587-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00587-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T11:59:00Z","timestamp":1659095940000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00587-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,9]]},"references-count":94,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["587"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00587-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,9]]},"assertion":[{"value":"9 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Teik Guan Tan declares that he has no conflict of interest. Pawel Szalachowski declares that he has no conflict of interest. Jianying Zhou declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}